Aller au contenu
Skip to CUSTOM_HTML-19
Skip to RECENT-POSTS-2
Skip to SEARCH-2
Skip to CUSTOM_HTML-2
Skip to RSS-5
Skip to RSS-4
Skip to BLOCK-2
Skip to META-2
Skip to LISTPACKAGES-2
Skip to CUSTOM_HTML-6
Skip to CUSTOM_HTML-17
Skip to CUSTOM_HTML-16
Skip to CUSTOM_HTML-11
Skip to CUSTOM_HTML-5
Skip to CUSTOM_HTML-7
Skip to CUSTOM_HTML-8
Skip to AKISMET_WIDGET-2
Skip to CUSTOM_HTML-9
Skip to TAG_CLOUD-2
Skip to ARCHIVES-2
Skip to CUSTOM_HTML-13
Skip to CUSTOM_HTML-18
Skip to CUSTOM_HTML-15
Attention à vos informations.

TNT Sécurité

Attention à vos informations.

Shrunk Expand

Navigation Principale

  • Contactez-moi
  • Page de maintenance
  • Section Privée
Articles plus récents→
  • Archives du Blog blog
  • SQLi Dorks Generator

    Posté dans 20 mai 2025 5:31 pm par TNT Sécurité

    SQLi Dork Generator


    Cracking Logiciels divers
  • SQLi Dumper 10.5

    Posté dans 18 mai 2025 12:47 pm par TNT Sécurité

    SQLi Dumper 10.5


    Cracking Logiciels divers

Pagination des publications

Précédent 1 2

  • Your Information:


    Your IP: 216.73.216.158

    Country: United States

    Flag:

    Region: OH

    City: Columbus

    Browser: Unknown

    System: Unknown OS Platform

  • Login

    • Inscription
    • Connexion
    • Flux des publications
    • Flux des commentaires
    • Site de WordPress-FR
  • Outils

    Icône
    Swiss Army Suite (SAS) | 9.35 MB
    Télécharger
    Icône
    Mango Keywords 3.4.1 | 25.26 MB
    Télécharger
    Icône
    Dork Searcher V3 | 64.46 MB
    Télécharger
    Icône
    Magic Dork V3.4.5 | 14.59 MB
    Télécharger
    Icône
    SQLi Dorks Generator | 1.62 MB
    Télécharger
    Icône
    SQLi Dumper 10.5 | 31.46 KB
    Télécharger
    Icône
    Scan Now UPnP | 5.91 MB
    ScanNowUPnP
  • Microsoft Office Pro 2024

    Microsoft Office Pro 2024

  • Windows 11 Téléchargez le .ISO

    Windows 11 ISO

  • Darwbeb avec Tails

    Darkweb avec Tails

  • Articles parlant de Metasploit

    KRACK Attack

  • L’exploit KRACK affecte tous les périphériques Wi-Fi

    KRACK Attack

  • Windows 10 Téléchargez le .ISO

    Windows 10

  • Vulnérabilité DNS

    DNS

  • Indésirable bloqué

    0 indésirable bloqué par Akismet
  • Vitesse de connexion

    Test your Internet connection speed at Speedtest.net

  • Catégories

    Cracking Différentes attaques Divers Encryption routeur Failles de sécurités Information Metasploit Microsoft Protection
  • Archives

    • juillet 2025 2
    • juin 2025 1
    • mai 2025 2
    • avril 2025 1
    • mai 2024 2
    • janvier 2023 4
    • janvier 2019 2
    • novembre 2018 2
    • octobre 2017 1
    • juin 2017 2
    • février 2017 1
    • novembre 2016 2
    • octobre 2016 1
    • octobre 2015 1
    • août 2015 1
    • octobre 2014 2
    • septembre 2014 3
    • août 2014 2
    • décembre 2013 1
    • novembre 2013 3
  • TNT Hacking World

  • Articles récents

    • Comment installer SilverBullet Pro 1.5.8
    • Comment les Hackers utilisent OpenBullet 2 pour accéder vos comptes.
    • Comment installer/configurer OpenBullet 2
    • Comment les hackers créent des combo lists
    • Burp Suite Pro 2025
    • Microsoft Office Pro 2024 LTSC
    • Evil Portal pour envoyer un payload à un client.
    • Comment contourner Microsoft Defender et établir une session Meterpreter avec persistence.
    • Téléchargez le ISO de Windows 11
    • Office 2021 Pro LTSC
  • Exploit Database

    Exploit Database

  • Flux Common Vulnerability Database

    • CVE-2025-48044 17 octobre 2025
      High Severity Description Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/policy.ex and program routines 'Elixir.Ash.Policy.Policy':expression/2. This issue affects ash: from pkg:hex/ash@3.6.3 before pkg:hex/ash@3.7.1, from 3.6.3 before 3.7.1, from 79749c2685ea031ebb2de8cf60cc5edced6a8dd0 before 8b83efa225f657bfc3656ad8ee8485f9b2de923d. Read more at https://www.tenable.com/cve/CVE-2025-48044
    • CVE-2023-28815 17 octobre 2025
      Critical Severity Description Some versions of Hikvision's iSecure Center Product contain insufficient parameter validation, resulting in a command injection vulnerability. Attackers may exploit this to gain platform privileges and execute arbitrary commands on the system.iSecure Center is software released for China's domestic market only, with no overseas release. Read more at https://www.tenable.com/cve/CVE-2023-28815
    • CVE-2023-28814 17 octobre 2025
      Critical Severity Description Some versions of Hikvision's iSecure Center Product have an improper file upload control vulnerability. Due to the improper verification of file to be uploaded, attackers may upload malicious files to the server. iSecure Center is software released for China's domestic market only, with no overseas release. Read more at https://www.tenable.com/cve/CVE-2023-28814
    • CVE-2025-11895 17 octobre 2025
      Medium Severity Description The Binary MLM Plan plugin for WordPress is vulnerable to insecure direct object reference in versions up to, and including, 3.0. This is due to the bmp_user_payout_detail_of_current_user() function selecting payout records solely by id without verifying ownership. This makes it possible for authenticated attackers with the bmp_user role (often subscribers) to view […]
    • CVE-2025-55099 17 octobre 2025
      Low Severity Description In USBX before 6.4.3, the USB support module for Eclipse Foundation ThreadX, there was a potential out of bound read issue in _ux_host_class_audio_alternate_setting_locate() when parsing a descriptor with attacker-controlled frequency fields. Read more at https://www.tenable.com/cve/CVE-2025-55099
  • Flux Bugtraq

    • Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS) 16 octobre 2025
      Posted by Gynvael Coldwind on Oct 15Vendor Response Pattern Hi Christopher, Vendor is correct with this one. The problem isn't the vendor's site – it's that the browser is already pwned with the malicious browser extension (this is site-agnostic). You've mentioned "No user interaction required beyond normal application usage.", but having "Malicious browser extension" installed […]
    • Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS) 14 octobre 2025
      Posted by Christopher Dickinson via Fulldisclosure on Oct 13Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com CVE Identifiers * CVE-2025-[PENDING] - Excessive Data Exposure / JWT Token Leakage * CVE-2025-[PENDING] - Broken Object Level Authorization (IDOR) * CVE-2025-[PENDING] - Unrestricted Resource Consumption (DoS) Executive Summary This security advisory details three significant vulnerabilities discovered in the Suno.com […]
    • [SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal 14 octobre 2025
      Posted by SBA Research Security Advisory via Fulldisclosure on Oct 13# Checkmk Path Traversal # Link: https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250730-01_Checkmk_Path_Traversal ## Vulnerability Overview ## Checkmk in versions before 2.4.0p13, 2.3.0p38 and 2.2.0p46, as well as since version 2.1.0b1 is prone to a path traversal vulnerability in the report scheduler. Due to an insufficient validation of a file name […]
    • [SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files 14 octobre 2025
      Posted by SBA Research Security Advisory via Fulldisclosure on Oct 13# Checkmk Agent Privilege Escalation via Insecure Temporary Files # Link: https://github.com/sbaresearch/advisories/tree/public/2025/SBA-ADV-20250724-01_Checkmk_Agent_Privilege_Escalation_via_Insecure_Temporary_Files ## Vulnerability Overview ## The `win_license` plugin as included in Checkmk agent for Windows versions before 2.4.0p13, 2.3.0p38 and 2.2.0p46, as well as since version 2.1.0b2 and 2.0.0p28 allows low privileged users to […]
    • CVE-2025-59397 - Open Web Analytics SQL Injection 9 octobre 2025
      Posted by Seralys Research Team via Fulldisclosure on Oct 08 Seralys Security Advisory | https://www.seralys.com/research ====================================================================== Title: SQL Injection Vulnerability Product: Open Web Analytics (OWA) Affected: Confirmed on 1.8.0 (older versions likely affected) Fixed in: 1.8.1 Vendor: Open Web Analytics (open-source) Discovered: August 2025 Severity: HIGH CWE: CWE-89: SQL Injection CVE: CVE-2025-59397...
  • Visiteurs

    Flag Counter
  • Weather

    GATINEAU WEATHER
  • Crypto


©2025 raindrops Flux RSS des articles et Flux RSS des commentaires Thème Raindrops