Aller au contenu
Skip to CUSTOM_HTML-19
Skip to RECENT-POSTS-2
Skip to SEARCH-2
Skip to CUSTOM_HTML-2
Skip to RSS-5
Skip to RSS-4
Skip to BLOCK-2
Skip to META-2
Skip to LISTPACKAGES-2
Skip to CUSTOM_HTML-6
Skip to CUSTOM_HTML-17
Skip to CUSTOM_HTML-16
Skip to CUSTOM_HTML-11
Skip to CUSTOM_HTML-5
Skip to CUSTOM_HTML-7
Skip to CUSTOM_HTML-8
Skip to AKISMET_WIDGET-2
Skip to CUSTOM_HTML-9
Skip to TAG_CLOUD-2
Skip to ARCHIVES-2
Skip to CUSTOM_HTML-13
Skip to CUSTOM_HTML-18
Skip to CUSTOM_HTML-15
Attention à vos informations.

TNT Sécurité

Attention à vos informations.

Shrunk Expand

Navigation Principale

  • Contactez-moi
  • Page de maintenance
  • Section Privée

Archives de l'Année

  • Link to Year Archives 2024
  • Link to Year Archives 2025
1
2
3
41 Articles archivés
52 Articles archivés
61 Articles archivés
72 Articles archivés
8
9
10
11
12
  • Your Information:


    Your IP: 40.77.167.47

    Country: United States

    Flag:

    Region: VA

    City: Boydton

    Browser: Chrome

    System: Unknown OS Platform

  • Login

    • Inscription
    • Connexion
    • Flux des publications
    • Flux des commentaires
    • Site de WordPress-FR
  • Outils

    Icône
    Swiss Army Suite (SAS) | 9.35 MB
    Télécharger
    Icône
    Mango Keywords 3.4.1 | 25.26 MB
    Télécharger
    Icône
    Dork Searcher V3 | 64.46 MB
    Télécharger
    Icône
    Magic Dork V3.4.5 | 14.59 MB
    Télécharger
    Icône
    SQLi Dorks Generator | 1.62 MB
    Télécharger
    Icône
    SQLi Dumper 10.5 | 31.46 KB
    Télécharger
    Icône
    Scan Now UPnP | 5.91 MB
    ScanNowUPnP
  • Microsoft Office Pro 2024

    Microsoft Office Pro 2024

  • Windows 11 Téléchargez le .ISO

    Windows 11 ISO

  • Darwbeb avec Tails

    Darkweb avec Tails

  • Articles parlant de Metasploit

    KRACK Attack

  • L’exploit KRACK affecte tous les périphériques Wi-Fi

    KRACK Attack

  • Windows 10 Téléchargez le .ISO

    Windows 10

  • Vulnérabilité DNS

    DNS

  • Indésirable bloqué

    0 indésirable bloqué par Akismet
  • Vitesse de connexion

    Test your Internet connection speed at Speedtest.net

  • Catégories

    Cracking Différentes attaques Divers Encryption routeur Failles de sécurités Information Metasploit Microsoft Protection
  • Archives

    • juillet 2025 2
    • juin 2025 1
    • mai 2025 2
    • avril 2025 1
    • mai 2024 2
    • janvier 2023 4
    • janvier 2019 2
    • novembre 2018 2
    • octobre 2017 1
    • juin 2017 2
    • février 2017 1
    • novembre 2016 2
    • octobre 2016 1
    • octobre 2015 1
    • août 2015 1
    • octobre 2014 2
    • septembre 2014 3
    • août 2014 2
    • décembre 2013 1
    • novembre 2013 3
  • TNT Hacking World

  • Articles récents

    • Comment installer SilverBullet Pro 1.5.8
    • Comment les Hackers utilisent OpenBullet 2 pour accéder vos comptes.
    • Comment installer/configurer OpenBullet 2
    • Comment les hackers créent des combo lists
    • Burp Suite Pro 2025
    • Microsoft Office Pro 2024 LTSC
    • Evil Portal pour envoyer un payload à un client.
    • Comment contourner Microsoft Defender et établir une session Meterpreter avec persistence.
    • Téléchargez le ISO de Windows 11
    • Office 2021 Pro LTSC
  • Exploit Database

    Exploit Database

  • Flux Common Vulnerability Database

    • CVE-2024-58314 12 décembre 2025
      High Severity Description Atcom 100M IP Phones firmware version 2.7.x.x contains an authenticated command injection vulnerability in the web configuration CGI script that allows attackers to execute arbitrary system commands. Attackers can inject shell commands through the 'cmd' parameter in web_cgi_main.cgi, enabling remote code execution with administrative credentials. Read more at https://www.tenable.com/cve/CVE-2024-58314
    • CVE-2024-58299 12 décembre 2025
      Critical Severity Description PCMan FTP Server 2.0 contains a buffer overflow vulnerability in the 'pwd' command that allows remote attackers to execute arbitrary code. Attackers can send a specially crafted payload during the FTP login process to overwrite memory and potentially gain system access. Read more at https://www.tenable.com/cve/CVE-2024-58299
    • CVE-2025-14572 12 décembre 2025
      High Severity Description A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This affects an unknown part of the file /goform/formWebAuthGlobalConfig. Performing manipulation of the argument hidcontact results in memory corruption. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early […]
    • CVE-2025-8082 12 décembre 2025
      Medium Severity Description Improper neutralization of the title date in the 'VDatePicker' component in Vuetify, allows unsanitized HTML to be inserted into the page. This can lead to a Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss attack. The vulnerability occurs because the 'title-date-format' property of the 'VDatePicker' can accept a user created function and assign its output to […]
    • CVE-2025-14568 12 décembre 2025
      Medium Severity Description A security vulnerability has been detected in haxxorsid Stock-Management-System up to fbbbf213e9c93b87183a3891f77e3cc7095f22b0. This impacts an unknown function of the file model/User.php. The manipulation of the argument employee_id/id/admin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases […]
  • Flux Bugtraq

    • Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) 5 décembre 2025
      Posted by Yuffie Kisaragi via Fulldisclosure on Dec 05Advisory ID: CONVERCENT-2025-001 Title: Multiple Security Misconfigurations and Customer Enumeration Exposure in Convercent Whistleblowing Platform (EQS Group) Date: 2025-12-04 Vendor: EQS Group Product: Convercent Whistleblowing Platform (app.convercent.com) Severity: Critical CVSS v4.0 Base Score: 9.3 Vector: AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N Summary A series of security weaknesses were identified in the Convercent...
    • 8 vulnerabilities in AudioCodes Fax/IVR Appliance 2 décembre 2025
      Posted by Pierre Kim on Dec 01## Advisory Information Title: 8 vulnerabilities in AudioCodes Fax/IVR Appliance Advisory URL: https://pierrekim.github.io/advisories/2025-audiocodes-fax-ivr.txt Blog URL: https://pierrekim.github.io/blog/2025-11-20-audiocodes-fax-ivr-8-vulnerabilities.html Date published: 2025-11-20 Vendors contacted: Audiocodes Release mode: Released CVE: CVE-2025-34328, CVE-2025-34329, CVE-2025-34330, CVE-2025-34331, CVE-2025-34332, CVE-2025-34333,...
    • 2 vulnerabilities in Egovframe 2 décembre 2025
      Posted by Pierre Kim on Dec 01## Advisory Information Title: 2 vulnerabilities in Egovframe Advisory URL: https://pierrekim.github.io/advisories/2025-egovframe.txt Blog URL: https://pierrekim.github.io/blog/2025-11-20-egovframe-2-vulnerabilities.html Date published: 2025-11-20 Vendors contacted: KISA/KrCERT Release mode: Released CVE: CVE-2025-34336, CVE-2025-34337 ## Product description Egovframe is a Java-based framework mainly used in the websites of the Government of...
    • [REVIVE-SA-2025-005] Revive Adserver Vulnerability 2 décembre 2025
      Posted by Matteo Beccati on Dec 01======================================================================== Revive Adserver Security Advisory REVIVE-SA-2025-005 ------------------------------------------------------------------------ https://www.revive-adserver.com/security/revive-sa-2025-005 ------------------------------------------------------------------------ Date: 2025-11-26 Risk Level: Medium Applications affected: Revive...
    • Missing Critical Security Headers in Legality WHISTLEBLOWING 2 décembre 2025
      Posted by Aerith Gainsborough via Fulldisclosure on Dec 01Advisory ID: LEGALITYWHISTLEBLOWING-2025-001 Title: Missing Critical Security Headers in Legality WHISTLEBLOWING Date: 2025-11-29 Vendor: DigitalPA (segnalazioni.net) Severity: High CVSS v3.1 Base Score: 8.2 (High) Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N Summary: Multiple public deployments of Legality WHISTLEBLOWING by DigitalPA are missing essential HTTP security headers. This misconfiguration exposes users to client-side […]
  • Visiteurs

    Flag Counter
  • Weather

    GATINEAU WEATHER
  • Crypto


©2025 raindrops Flux RSS des articles et Flux RSS des commentaires Thème Raindrops