In this post we will focus on solving the first challenge of Damn Vulnerbale Defi wargame designed to teach developer…
KollectApp is a desktop application which is used heavily in the banking sector, it’s used to manage loans collection given…
Today i will speak about post messages in javascript and how it can cause cross site scripting on web applications.first…
Serialization and Deserialization From Microsoft docs Serialization is the process of converting the state of an object into a form…
This is a vulnerability which i discovered in a penetration test activity, the extract data feature in the Oracle EPM…
During my research work with Comparitech company in Canada as a freelance i discovered a vulnerability in a free mobile…
Just a quick write-up for RedHat Cloud Form Cloud management graphical interface vulnerability (CVE-2017-15123) which affects versions 5.8, 5.9 and…
I’m writing this article to show a critical and easy exploitable vulnerability which i found while playing with drozer framework.…
in this article I will show in a high level details about an authentication bypass which i found in HG8245H…
Lab: Reconnaissance Let’s start the fun by doing an nmap scan on our Victim machine 192.168.1.8 we found multiple services…