Yasin Saffarisymbolexe.xyz·Apr 24, 2024VulnersX ToolVulnersX VulnersX is a powerful tool for efficiently searching and analyzing software vulnerabilities. It provides comprehensive results with both SQLite database and text file outputs, ensuring flexibility and ease of use for security professionals ...Discuss#cybersecurity
Yasin Saffarisymbolexe.xyz·Apr 24, 2024SHIFU ToolSHIFU is a comprehensive and powerful toolkit designed to streamline the process of finding detailed information about Common Vulnerabilities and Exposures (CVEs). Introduction SHIFU is a comprehensive and powerful toolkit designed to streamline the ...Discuss#cybersecurity
Yasin Saffarisymbolexe.xyz·Apr 24, 2024OOGWAY ToolOOGWAY is a powerful command-line utility designed to streamline the search for vulnerabilities and details regarding Common Vulnerabilities and Exposures (CVEs). Overview OOGWAY simplifies the process of searching for vulnerabilities and accessing C...Discuss#cybersecurity
Yas NEGforHaysecblog.haysec.com·Apr 23, 2024CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtectDescription A vulnerability in the GlobalProtect feature of specific versions of Palo Alto Networks PAN-OS software, due to arbitrary file creation, could allow an unauthenticated attacker to execute arbitrary code with root privileges on the affecte...Discuss·1 likevulnerability
Jubril Edunjubriledun.hashnode.dev·Apr 22, 2024Vulnerability Scanning (nmap, Nessus, Metasploitable 2)In this project, we will be practicising vulnerability management by scanning a vulnerable virtual machine (Metasploitable 2) using scanning tools (nmap and Nessus) Vulnerability Management is the process of identifying security flaws and vulnerabili...Discussnessus
The CyberShield Chroniclescyberinsights.hashnode.dev·Apr 19, 202423 Vulnerabilities in Google Chrome Browser that Allows Remote Code Execution PatchedThreat Summary Google addressed 23 vulnerabilities in its Chrome browser on April 16, 2024, covering Windows, Mac, and Linux platforms. These vulnerabilities spanned various issues, from object corruption in V8 and WebAssembly to multiple use-after-f...Discussthreat intelligence
Mainul Hasanhashnode.mmainulhasan.com·Apr 7, 2024A Guide to Common Web Application Security Vulnerabilities and MitigationIn today’s digital age, web applications have become central to the operations of businesses across the globe. At the same time, these applications offer unprecedented convenience and functionality but pose significant security risks. This blog post ...Discuss#sqlinjection
Balajibalajidevops.hashnode.dev·Mar 29, 2024Title: Exploring Prowler: A Comprehensive Guide to AWS Security and Compliance MonitoringIntroduction: In today's cloud-centric world, ensuring the security and compliance of AWS (Amazon Web Services) environments is paramount for organizations of all sizes. Prowler, an open-source security tool, has emerged as a powerful solution for au...Discuss·2 likes·59 readsAWS
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.dev·Mar 29, 2024A Deep Dive Understanding of Smart Contract Vulnerabilities - Part 1This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts. A security issue in Solidity boils down to smart contracts not behaving t...DiscussWeb3
Andreas RenzforEncryptoriumblog.encryptorium.com·Mar 28, 2024The Heartbleed Vulnerability: CVE-2014-0160The Heartbleed bug is one of the most significant security vulnerabilities that have impacted the internet, affecting millions of web servers and users' data security worldwide. Discovered in April 2014, Heartbleed was a severe flaw in OpenSSL, a wid...Discussheartbleed