ImpressCMS is a free, community-driven content management system written in PHP, which considers itself to be secure, fast, and modular. This post shows us that inconspicuous variables may be under the influence of the user and thus can result in critical security vulnerabilities.
Hibernate is among one of the most commonly found database libraries used in Java web applications, shipping with its own query language.
This technical post will teach you how to detect and exploit Hibernates very own vulnerability: The HQL Injection.
BigTree is a small content management system which does not depend on many frameworks and advertises itself as user friendly and developer ready. In this blog post, we will take a look at a few vulnerabilities we have detected in the codebase of BigTree.
In this technical blog post we will examine how a drive by exploit in the Pimcore release 6.2.0 allows an attacker to execute OS commands by tricking an authenticated administrator into exploiting a command injection vulnerability.
SuiteCRM, a customer relationship software, is a great first economic choice as CRM software because it is free and open source. However, in this blog post we will see how a vulnerable web application deployed in the internal network of your company can act as a charming entry gateway for any adversary.
We use cookies to ensure that we give you the best experience on our website. If you continue to use
this site we will assume that you are happy with it.
More Information