Aggregator
HTTP/2 Header Field Re-used Attack Trick
4 years 8 months ago
TonghuaRoot
【Java 代码审计入门-04】SSRF 漏洞原理与实际案例介绍
4 years 8 months ago
【Java 代码审计入门-04】SSRF 漏洞原理与实际案例介绍
DC Metro Police Hit With Ransomware Attack
4 years 8 months ago
Summary
About a week ago, the Infosecurity Group reported that Washington D.C.'s metro police department was hit by ransomware threat actors of Russian origins.
Threat Type
Ransomware
Overview
The Babuk group claimed to have information on confidential informants used by the district's police department. Metro police only acknowledged the breach but not whether or not they paid the ransom or even that there was an attack and that ransom was being sought. The information the group claimed to have included ga
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
4 years 8 months ago
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
4 years 8 months ago
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
VMware Security Advisory VMSA-2021-0007
4 years 8 months ago
Summary
VMWare published a security advisory, VMSA-2021-0007, that addresses a remote code execution vulnerability in VMware vRealize Business for Cloud.
Threat Type
Vulnerability
Overview
VMWare published a security advisory, VMSA-2021-0007, that addresses a vulnerability (CVE-2021-21984) in VMware vRealize Business for Cloud. The vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on an affected vRealize Business for Cloud Virtual appliance. We recommend reviewing the ad
Cisco Security Advisories May 5 2021
4 years 8 months ago
Summary
Cisco has published twenty-nine Security Advisories. Of the advisories, two are rated as Critical, seven are rated as High, nineteen are rated as Medium, and one is rated as Informational.
Threat Type
Vulnerability
Overview
Cisco has published twenty-nine Security Advisories. Of the advisories, two are rated as Critical, seven are rated as High, nineteen are rated as Medium, and one is rated as Informational. Please note that one of the advisories summarized below (cisco-sa-anyconnect-profile-AggMUC
Defeating the Pirates
4 years 8 months ago
In Akamai's paper, "Inside the World of Video Pirates," we discovered why digital intellectual property theft (aka "piracy") is possibly the most misunderstood form of cybercrime facing the TV, sports, and film industries.
Ian Munford
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
4 years 8 months ago
【Java 代码审计入门-03】XSS 漏洞原理与实际案例介绍
java反射机制小结
4 years 8 months ago
带你了解 Java 反射知识
java反射机制小结
4 years 8 months ago
带你了解 Java 反射知识
java反射机制小结
4 years 8 months ago
带你了解 Java 反射知识
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
开源信息收集周报#73
4 years 8 months ago
情报小蜜蜂改版啦~
Multiple Vulnerabilities in Exim Disclosed
4 years 8 months ago
Summary
Twenty-one vulnerabilities in Exim have been disclosed by Qualys. Three of the vulnerabilities could allow for remote code execution.
Threat Type
Vulnerability
Overview
Twenty-one vulnerabilities in Exim have been disclosed by Qualys. Of the most serious vulnerabilities, three could allow for remote code execution, and four could allow for escalation of privileges to those of root. In total, ten of the vulnerabilities are exploitable remotely and eleven are exploitable locally. Qualys has not provid