➠ WUZHI CMS 4.1.0 index.php dir pathname traversal
A vulnerability classified as critical has been found in WUZHI CMS 4.1.0 (Content Management System). Affected is an unknown code block of the file coreframe/app/template/admin/index.php. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product....
Zur Startseite
➤ Ähnliche Beiträge für 'WUZHI CMS 4.1.0 index.php dir pathname traversal'
Scrcpy - Display And Control Your Android Device
vom 1945.89 Punkte
pronounced "screen copy"Read in another languageThis application provides display and control of Android devices connected via USB or over TCP/IP. It does not require any root access. It works on GNU/Linux, Windows and macOS.It focuses on:lightness: native, displays only the device screenperformance: 30~120fps, dependin
Labtainers - A Docker-based Cyber Lab Framework
vom 1901.66 Punkte
Labtainers include more than 50 cyber lab exercises and tools to build your own. Import a single VM appliance or install on a Linux system and your students are done with provisioning and administrative setup, for these and future lab exercises. Consistent lab execution environments and automa
SCMKit - Source Code Management Attack Toolkit
vom 1834.25 Punkte
Source Code Management Attack Toolkit - SCMKit is a toolkit that can be used to attack SCM systems. SCMKit allows the user to specify the SCM system and attack module to use, along with specifying valid credentials (username/password or API key) to the respective SCM system. Currently, the
CATS - REST API Fuzzer And Negative Testing Tool For OpenAPI Endpoints
vom 1724.69 Punkte
REST API fuzzer and negative testing tool. Run thousands of self-healing API tests within minutes with no coding effort!Comprehensive: tests are generated automatically based on a large number scenarios and cover every field and headerIntelligent: tests are generated based on data types and constraint
The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022
vom 1623.68 Punkte
Maddie Stone, Security Researcher, Threat Analysis Group (TAG)This is Google’s fourth annual year-in-review of 0-days exploited in-the-wild [2021, 2020, 2019] and builds off of the mid-year 2022 review. The goal of this report is not to detail each indivi
The Ups and Downs of 0-days: A Year in Review of 0-days Exploited In-the-Wild in 2022
vom 1623.68 Punkte
Maddie Stone, Security Researcher, Threat Analysis Group (TAG)This is Google’s fourth annual year-in-review of 0-days exploited in-the-wild [2021, 2020, 2019] and builds off of the mid-year 2022 review. The goal of this report is not to detail each indivi
JAX on the Web with TensorFlow.js
vom 1076.04 Punkte
Posted by Andreas Steiner and Marc van Zee, Google Research, Brain Team Introduction In this blog post we demonstrate how to convert and run Python-based JAX functions and Flax machine learning models in the browser using TensorFlow.js. We have produced three examples of JAX-to-TensorFlow.js conversion each with increasing complexity: A simple JAX function An image classification Flax mod
JAX on the Web with TensorFlow.js
vom 1076.04 Punkte
Posted by Andreas Steiner and Marc van Zee, Google Research, Brain Team Introduction In this blog post we demonstrate how to convert and run Python-based JAX functions and Flax machine learning models in the browser using TensorFlow.js. We have produced three examples of JAX-to-TensorFlow.js conversion each with increasing complexity: A simple JAX function An image classification Flax mod
DC-Sonar - Analyzing AD Domains For Security Risks Related To User Accounts
vom 890.81 Punkte
DC Sonar Community Repositories The project consists of repositories: dc-sonar-frontend dc-sonar-user-layer dc-sonar-workers-layer ntlm-scrutinizer Disclaimer It's only for education purposes. Avoid using it on the production Active Directory (AD)
Katana - A Next-Generation Crawling And Spidering Framework
vom 890.08 Punkte
A next-generation crawling and spidering framework Features • Installation • Usage • Scope • Config • Filters • Join Discord Features Fast And fully configurable web crawling Standard and Headless mode support JavaScript parsing / crawling Customizabl
EAST - Extensible Azure Security Tool - Documentation
vom 827.63 Punkte
Extensible Azure Security Tool (Later referred as E.A.S.T) is tool for assessing Azure and to some extent Azure AD security controls. Primary use case of EAST is Security data collection for evaluation in Azure Assessments. This information (JSON content) can then be used in various reporting
TripleCross - A Linux eBPF Rootkit With A Backdoor, C2, Library Injection, Execution Hijacking, Persistence And Stealth Capabilities.
vom 789.73 Punkte
TripleCross is a Linux eBPF rootkit that demonstrates the offensive capabilities of the eBPF technology. TripleCross is inspired by previous implant designs in this area, notably the works of Jeff Dileo at DEFCON 271, Pat Hogan at DEFCON 292, Guillaume