When Static Is Not Actually Static – Assetnote
Over the last ten years, we have seen the industrialization of the content management space. A decade ago, it felt like every individual and business…
Over the last ten years, we have seen the industrialization of the content management space. A decade ago, it felt like every individual and business…
The Vulnerability The Apache Tomcat team announced today that all Tomcat versions before 9.0.1 (Beta), 8.5.23, 8.0.47 and 7.0.82 contain a potentially dangerous remote code…
This post is an overview of a mobile app MitM vulnerability I’ve found several times in the real world. I’ll explain how an attacker can…
Impact When using --userns-remap, if the root user in the remapped namespace has access to the host filesystem they can modify files under /var/lib/docker/ that…
Compromising an unreachable Solr server with CVE-2013-6397 I recently did a pentest where I compromised a Solr server located several layers deep in a network.…
The Wallarm Detect team has found exploit attempts in the wild of CVE-2022-31678 and CVE-2021-39144. The original vulnerabilities were found in VMware NSX Manager at…
How to conduct a basic security code review | Security Simplified Source link
Two solutions for the January 2021 Initigriti XSS Challenge Source link
Hey there, I hope you’ve been doing well! Focusing on the Right Stuff I was going to write you a lovely intro, but unfortunately I’m…
Raidforums owner arrested 🚓 FBI have taken on the case 🚓 Source link
curl disclosed a bug submitted by kurohiro: https://hackerone.com/reports/1897203 Source link
Practical Junior Malware Researcher (PJMR) Exam Overview Source link