ma

Intel's Commitment To Making Its Stuff Secure Is Called Into Question







ma

Gold Galleon Hackers Target Maritime Shipping Industry





ma

User Management System 2.0 Cross Site Scripting

User Management System version 2.0 suffers from a persistent cross site scripting vulnerability.




ma

Complaint Management System 4.2 Cross Site Scripting

Complaint Management System version 4.2 suffers from a persistent cross site scripting vulnerability.





ma

Linux 5.6 IORING_OP_MADVISE Race Condition

Linux 5.6 has an issue with IORING_OP_MADVISE racing with coredumping.









ma

Digital Whisper Electronic Magazine #87

Digital Whisper Electronic Magazine issue 87. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #88

Digital Whisper Electronic Magazine issue 88. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #89

Digital Whisper Electronic Magazine issue 89. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #90

Digital Whisper Electronic Magazine issue 90. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #92

Digital Whisper Electronic Magazine issue 92. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #93

Digital Whisper Electronic Magazine issue 93. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #94

Digital Whisper Electronic Magazine issue 94. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #95

Digital Whisper Electronic Magazine issue 95. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #96

Digital Whisper Electronic Magazine issue 96. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #97

Digital Whisper Electronic Magazine issue 97. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #98

Digital Whisper Electronic Magazine issue 98. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #99

Digital Whisper Electronic Magazine issue 99. Written in Hebrew.




ma

Digital Whisper Electronic Magazine 100

Digital Whisper Electronic Magazine issue 100. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #101

Digital Whisper Electronic Magazine issue 101. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #102

Digital Whisper Electronic Magazine issue 102. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #103

Digital Whisper Electronic Magazine issue 103. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #105

Digital Whisper Electronic Magazine issue 105. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #106

Digital Whisper Electronic Magazine issue 106. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #107

Digital Whisper Electronic Magazine issue 107. Written in Hebrew.




ma

Digital Whisper Electronic Magazine #104

Digital Whisper Electronic Magazine issue 104. Written in Hebrew.




ma

FreeSWITCH Event Socket Command Execution

This Metasploit module uses the FreeSWITCH event socket interface to execute system commands using the system API command. The event socket service is enabled by default and listens on TCP port 8021 on the local network interface. This module has been tested successfully on FreeSWITCH versions: 1.6.10-17-726448d~44bit on FreeSWITCH-Deb8-TechPreview virtual machine; 1.8.4~64bit on Ubuntu 19.04 (x64); and 1.10.1~64bit on Windows 7 SP1 (EN) (x64).







ma

Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices







ma

Skippipe: Skipping The Watermark In Digital Content

Whitepaper called Skippipe: Skipping the watermark in digital content.




ma

Manually Exploiting Intel AMT

This document illustrates the manual exploitation of the vulnerability found in the Intel Active Management Technology in 2017 that stripped off the primary authentication mechanism in the Intel AMT web interface.




ma

From Zero Credentials To Full Domain Compromise

Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials.




ma

NagiosXI 5.6 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a remote command execution vulnerability in NagiosXI version 5.6.




ma

Symantec Web Gateway 5.0.2.8 Remote Command Execution

This is a whitepaper tutorial that walks through creating a proof of concept exploit for a pre-authentication remote command execution vulnerability in Symantec Web Gateway version 5.0.2.8.




ma

NagiosXI 5.6.11 Remote Command Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote command execution vulnerabilities in NagiosXI version 5.6.11.




ma

ManageEngine 14 Remote Code Execution

This is a whitepaper tutorial that describes steps taken to identify post-authentication remote code execution vulnerabilities in ManageEngine version 14.