Aller au contenu
Skip to CUSTOM_HTML-19
Skip to RECENT-POSTS-2
Skip to SEARCH-2
Skip to CUSTOM_HTML-2
Skip to RSS-5
Skip to RSS-4
Skip to CUSTOM_HTML-14
Skip to META-2
Skip to AKISMET_WIDGET-2
Skip to CUSTOM_HTML-11
Skip to CUSTOM_HTML-5
Skip to CUSTOM_HTML-16
Skip to CUSTOM_HTML-6
Skip to CUSTOM_HTML-17
Skip to CUSTOM_HTML-7
Skip to CUSTOM_HTML-8
Skip to CUSTOM_HTML-9
Skip to CUSTOM_HTML-10
Skip to TAG_CLOUD-2
Skip to ARCHIVES-2
Skip to CUSTOM_HTML-13
Skip to CUSTOM_HTML-18
Skip to CUSTOM_HTML-15
Attention à vos informations.
TNT Sécurité
Attention à vos informations.
Shrunk
Expand
Navigation Principale
Open
Liens web
Android
Section Privée
Open
Archives du Mois
« janvier
mai »
janvier
2023
1
2
3
Comment accéder sécuritairement votre réseau local à l'aide de PiVPN
2023-01-03 12:54:58
TNT Sécurité
4
5
6
7
8
9
10
11
12
13
14
Hacking -- Crypto monnaies -- Forum underground -- Informations
2023-01-14 21:29:28
TNT Sécurité
15
16
17
Office 2021 Pro LTSC
2023-01-17 16:49:18
TNT Sécurité
18
19
20
21
22
23
Téléchargez le ISO de Windows 11
2023-01-23 13:41:33
TNT Sécurité
24
25
26
27
28
29
30
31
TNT Hacking World
Articles récents
Evil Portal pour envoyer un payload à un client.
Comment contourner Microsoft Defender et établir une session Meterpreter avec persistence.
Téléchargez le ISO de Windows 11
Office 2021 Pro LTSC
Hacking — Crypto monnaies — Forum underground — Informations
Comment accéder sécuritairement votre réseau local à l’aide de PiVPN
Comment exploiter une faille de sécurité à l’aide de Metasploit.
Comment utiliser l’API Shodan avec du Python pour automatiser les recherches des périphériques vulnérables
20 commandes essentielles de Meterpreter
Hacker à l’aide de Metasploit et le module Shodan.
Search for:
Exploit Database
Common Vulnerability Database
CVE-2024-20098
7 octobre 2024
Medium Severity Description In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626. Read more at https://www.tenable.com/cve/CVE-2024-20098
CVE-2024-20099
7 octobre 2024
Medium Severity Description In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08997492; Issue ID: MSV-1625. Read more at https://www.tenable.com/cve/CVE-2024-20099
CVE-2024-20100
7 octobre 2024
Critical Severity Description In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603. Read more at https://www.tenable.com/cve/CVE-2024-20100
CVE-2024-20101
7 octobre 2024
Critical Severity Description In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602. Read more at https://www.tenable.com/cve/CVE-2024-20101
CVE-2024-20097
7 octobre 2024
Medium Severity Description In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630. Read more at https://www.tenable.com/cve/CVE-2024-20097
Bugtraq
Some SIM / USIM card security (and ecosystem) info
4 octobre 2024
Posted by Security Explorations on Oct 04Hello All, Those interested in SIM / USIM card security might find some information at our spin-off project page dedicated to the topic potentially useful: https://security-explorations.com/sim-usim-cards.html We share there some information based on the experiences gained in the SIM / USIM card security space, all in a hope this […]
SEC Consult SA-20240930-0 :: Local Privilege Escalation via MSI Installer in Nitro PDF Pro (CVE-2024-35288)
1 octobre 2024
Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Sep 30>
Backdoor.Win32.Benju.a / Unauthenticated Remote Command Execution
29 septembre 2024
Posted by malvuln on Sep 28Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/88922242e8805bfbc5981e55fdfadd71.txt Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Benju.a Vulnerability: Unauthenticated Remote Command Execution Family: Benju Type: PE32 MD5: 88922242e8805bfbc5981e55fdfadd71 SHA256: 7d34804173e09d0f378dfc8c9212fe77ff51f08c9d0b73d00a19b7045ddc1f0e Vuln ID: MVID-2024-0700...
Backdoor.Win32.Prorat.jz / Remote Stack Buffer Overflow (SEH)
29 septembre 2024
Posted by malvuln on Sep 28Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/277f9a4db328476300c4da5f680902ea.txt Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Prorat.jz Vulnerability: Remote Stack Buffer Overflow (SEH) Description: The RAT listens on TCP ports 51100,5112,5110 and runs an FTP service. Prorat uses a vulnerable component in a secondary malware […]
Backdoor.Win32.Amatu.a / Remote Arbitrary File Write (RCE)
29 septembre 2024
Posted by malvuln on Sep 28Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024 Original source: https://malvuln.com/advisory/1e2d0b90ffc23e00b743c41064bdcc6b.txt Contact: malvuln13 () gmail com Media: x.com/malvuln Threat: Backdoor.Win32.Amatu.a Vulnerability: Remote Arbitrary File Write (RCE) Family: Amatu Type: PE32 MD5: 1e2d0b90ffc23e00b743c41064bdcc6b SHA256: 77fff9931013ab4de6d4be66ca4fda47be37b6f706a7062430ee8133c7521297 Vuln ID: MVID-2024-0698 Dropped...