Aggregator
DragonForce
1 year 4 months ago
cohenido
A Threat Actor Allegedly Leaked Data of Israel National Digital Agency
1 year 4 months ago
A Threat Actor Allegedly Leaked Data of Israel National Digital Agency
Dark Web Informer
CVE-2005-0438 | awstats 6.3/6.4 awstats.pl debug information disclosure (EDB-853 / Nessus ID 16456)
1 year 4 months ago
A vulnerability classified as problematic has been found in awstats 6.3/6.4. Affected is an unknown function of the file awstats.pl. The manipulation of the argument debug leads to information disclosure.
This vulnerability is traded as CVE-2005-0438. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
对抗零日漏洞的十年(2014~2024)
1 year 4 months ago
“有效防御离不开对攻击手段的深入了解”
两个月的美团骑手体验
1 year 4 months ago
Matrix 首页推荐 Matrix 是少数派的写作社区,我们主张分享真实的产品体验,有实用价值的经验与思考。我们会不定期挑选 Matrix 最优质的文章,展示来自用户的最真实的体验和观点。文章代
天文学家在星际空间发现复杂碳分子
1 year 4 months ago
天文学家在遥远星际气体和尘埃云中发现了一种含碳的大分子。研究报告发表在《科学》期刊上。研究结果表明,含碳和氢的复杂有机分子可能存在于形成太阳系的寒冷、黑暗气体云中,它们对了解地球生命的早期起源至关重要。该分子被称为芘(Pyrene),是一种多环芳烃(或缩写 PAH)。PAH 分子由碳原子环组成。碳化学是地球生命的支柱。星际介质含有大量的 PAH 早已众所周知,它们在地球碳基生命起源理论中占有重要地位。
ZAIDDOS Targeted the Website of Roblox
1 year 4 months ago
ZAIDDOS Targeted the Website of Roblox
Dark Web Informer
CVE-2011-3368 | Oracle SPARC Enterprise M3000/M4000/M5000/M8000/M9000 up to XCP 111x XCP Firmware input validation (EDB-17969 / Nessus ID 75181)
1 year 4 months ago
A vulnerability classified as problematic was found in Oracle SPARC Enterprise M3000, M4000, M5000, M8000 and M9000 up to XCP 111x. This vulnerability affects unknown code of the component XCP Firmware. The manipulation leads to improper input validation.
This vulnerability was named CVE-2011-3368. The attack can be initiated remotely. Furthermore, there is an exploit available.
It is recommended to upgrade the affected component.
vuldb.com
DDOS TEAM ANONYMOUS Targeted the Website of National Transplant Center
1 year 4 months ago
DDOS TEAM ANONYMOUS Targeted the Website of National Transplant Center
Dark Web Informer
От чудо-кухни в СССР до роботов Tesla: история одного приёма
1 year 4 months ago
Мастерство Tesla — скрыть правду за яркими представлениями.
CVE-2002-1121 | Trend Micro Interscan Viruswall up to 7.1 SMTP Content Filter Engine privileges management (VU#836088 / XFDB-10088)
1 year 4 months ago
A vulnerability was found in Trend Micro Interscan Viruswall up to 7.1. It has been classified as critical. Affected is an unknown function of the component SMTP Content Filter Engine. The manipulation leads to improper privilege management.
This vulnerability is traded as CVE-2002-1121. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
New Cisco ASA and FTD features block VPN brute-force password attacks
1 year 4 months ago
Cisco has added new security features that significantly mitigate brute-force and password spray attacks on Cisco ASA and Firepower Threat Defense (FTD), helping protect the network from breaches and reducing resource utilization on devices. [...]
Lawrence Abrams
CVE-2024-10429 | WAVLINK WN530H4/WN530HG4/WN572HG3 up to 20221028 internet.cgi set_ipv6 IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr command injection
1 year 4 months ago
A vulnerability classified as critical has been found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. Affected is the function set_ipv6 of the file internet.cgi. The manipulation of the argument IPv6OpMode/IPv6IPAddr/IPv6WANIPAddr/IPv6GWAddr leads to command injection.
This vulnerability is traded as CVE-2024-10429. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
CVE-2024-10428 | WAVLINK WN530H4/WN530HG4/WN572HG3 up to 20221028 firewall.cgi set_ipv6 dhcpGateway command injection
1 year 4 months ago
A vulnerability was found in WAVLINK WN530H4, WN530HG4 and WN572HG3 up to 20221028. It has been rated as critical. This issue affects the function set_ipv6 of the file firewall.cgi. The manipulation of the argument dhcpGateway leads to command injection.
The identification of this vulnerability is CVE-2024-10428. The attack may be initiated remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
vuldb.com
henrymans0n Has Allegedly Leaked the Database of Aurat Foundation
1 year 4 months ago
henrymans0n Has Allegedly Leaked the Database of Aurat Foundation
Dark Web Informer
Submit #427274: wavlink WN530H4,WN530HG4,WN572HG3 WN530H4-WAVLINK_20220721,WN530HG4-WAVLINK_20220809,WN572HG3-WAVLINK_WO_20221028 Command Injection [Accepted]
1 year 4 months ago
Submit #427274 / VDB-281970
Stellar Lab
Submit #427272: wavlink WN530H4,WN530HG4,WN572HG3 WN530H4-WAVLINK_20220721,WN530HG4-WAVLINK_20220809,WN572HG3-WAVLINK_WO_20221028 Command Injection [Accepted]
1 year 4 months ago
Submit #427272 / VDB-281969
Stellar Lab
CVE-2024-10427 | Codezips Pet Shop Management System 1.0 /deleteanimal.php t1 sql injection
1 year 4 months ago
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /deleteanimal.php. The manipulation of the argument t1 leads to sql injection.
This vulnerability was named CVE-2024-10427. The attack can be initiated remotely. Furthermore, there is an exploit available.
The initial researcher advisory mentions the parameter "refno" to be affected. But further inspection indicates that the name of the affected parameter is "t1".
vuldb.com
CVE-2024-10426 | Codezips Pet Shop Management System 1.0 /animalsadd.php id sql injection
1 year 4 months ago
A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /animalsadd.php. The manipulation of the argument id leads to sql injection.
This vulnerability is uniquely identified as CVE-2024-10426. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
The initial researcher advisory mentions the parameter "refno" to be affected. But further inspection indicates that the name of the affected parameter is "id".
vuldb.com