Resin Application Server version 4.0.36 suffers from a cross site scripting vulnerability.
9131869d6c123f0f0dbe461c18fc3566baa98280458dcfae60da771b9aa063f4
Resin Application Server version 4.0.36 suffers from a source code disclosure vulnerability.
2fc67dac9f1b2d970f3e260d7b1ffdd84c2a4cbee7aa7d21215ff583bf1ede4a
Quick TFTP server version 2.2 suffers from a denial of service vulnerability.
f0c233ddb33905a4fa288f0cc9347a9f0da1084c673bff68789be6d2e852c4f6
ZPanel version 10.0.0.2 suffers from a remote root command execution vulnerability.
a30a5948320c316bd884408d4f9e6e18b520ce906e9bb8f59bc103d82a9b44d4
ASUS RT56U versions 3.0.0.4.360 and below suffer from a remote command injection vulnerability.
d5ec9bf8cece4256800e07f806a8eeba5ea5018224e988bbddedf118e4b8ca92
This whitepaper explores the post exploitation of Metasploit using a generic shell rather than the meterpreter shell.
90af38e7b5b9001e07a318bfb68c614d438e23240e28c77f04d62899a4c03353
Bricks is a web application security learning platform built on PHP and MySQL. The project focuses on variations of commonly seen application security issues. Each 'Brick' has some sort of security issue which can be leveraged manually or using automated software tools. The mission is to 'Break the Bricks' and thus learn the various aspects of web application security. Bricks is a completely free and open source project brought to you by OWASP.
ca4837bc42e1578edd8c517a6f8196ccdc384009e6c13d81375109e90cf7f513
Digital Whisper Electronic Magazine issue 42. Written in Hebrew.
45353cecd527371306e9de0b2b09f5cb82edd6386a75b450f34f1b4f780ff102
KNet Web Server version 1.04b suffers from a local denial of service vulnerability.
f0d71a0abb837f933fbe0d5e2d30668d1c75f4e0c28cca5480a4436312fccc25
The AVG official blog suffers from a cross site scripting vulnerability. The author has notified AVG of the issue.
63bca005b71bc8e4a0bc101bcf83fed62c7bd61e1ea93aa6f7d05d71cc1c029c
The Redtube official blog suffers from a cross site scripting vulnerability. The author has received no response from the owner once reporting this issue.
bf3e341e19ca11d4c98eb5882fab31af5f8c4727a0a9c315a87690786521fdc4
This Metasploit module exploits a use-after-free vulnerability in Microsoft Internet Explorer where a DOM textNode pointer becomes corrupted after style computation. This pointer is then overwritten when the innerHTML property on the parent object is set.
b6745968884cf6b6554a200804a5583329d082da0e92b0007d893fd030dd188e