an

User Management System 2.0 Cross Site Scripting

User Management System version 2.0 suffers from a persistent cross site scripting vulnerability.




an

Complaint Management System 4.2 Cross Site Scripting

Complaint Management System version 4.2 suffers from a persistent cross site scripting vulnerability.




an

Easy Transfer 1.7 Cross Site Scripting / Directory Traversal

Easy Transfer version 1.7 for iOS suffers from cross site scripting and directory traversal vulnerabilities.




an

WordPress WooCommerce Advanced Order Export 3.1.3 Cross Site Scripting

WordPress WooCommerce Advanced Order Export plugin version 3.1.3 suffers from a cross site scripting vulnerability.








an

Linux/x64 Anti-Debug Trick INT3 Trap Shellcode

113 bytes small Linux/x64 anti-debug trick (INT3 trap) with execve("/bin/sh") shellcode that is NULL free.














an

Cartoon Network Hacked Worldwide To Show Brazilian Stripper Videos






an

Brazilian Firm Exposes Personal Details Of Thousands Of Soccer Fans





an

Phrack - Viewer Discretion Advised - (De)coding An iOS Kernel Vulnerability

Phrack Viewer Discretion Advised write up called (De)coding an iOS Kernel Vulnerability.




an

Covert Channel And Data Hiding In TCP/IP

Whitepaper called Covert Channel and Data Hiding in TCP/IP.




an

FreeSWITCH Event Socket Command Execution

This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64).




an

Debian Security Advisory 4577-1

Debian Linux Security Advisory 4577-1 - Tim Dusterhus discovered that haproxy, a TCP/HTTP reverse proxy, did not properly sanitize HTTP headers when converting from HTTP/2 to HTTP/1. This would allow a remote user to perform CRLF injections.






an

Yes, You Can Remotely Hack Factory, Building Site Cranes. Wait, What?






an

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices







an

Design And Implementation Of A Voice Encryption System For Telephone Networks

This whitepaper goes into detail on design and implementation details for performing voice encryption on telephone networks. Written in Spanish.




an

ICMPv6 Router Announcement Flooding Denial Of Service

An ICMPv6 router announcement flooding denial of service vulnerability affects multiple systems including Cisco, Juniper, Microsoft, and FreeBSD. Cisco has addressed the issue but Microsoft has decided to ignore it.




an

Dr. Anthony Fauci Forced To Beef Up Security As Death Threats Increase




an

Deciphering The SWIFT-DRIDEX Relationship In Bank

This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.




an

Manually Exploiting Intel AMT

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.




an

Pentesting Zen Load Balancer

This whitepaper is a quick tutorial on pentesting the Zen load balancer.




an

NagiosXI 5.6 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.




an

Symantec Web Gateway 5.0.2.8 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.