Explore >> Select a destination


You are here

www.nodejs-security.com
| | blog.securityinnovation.com
3.5 parsecs away

Travel
| | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.
| | swordbytes.com
3.6 parsecs away

Travel
| | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.
| | blog.talosintelligence.com
3.3 parsecs away

Travel
| | As the Akira ransomware group continues to evolve its operations, Talos has the latest research on the group's attack chain, targeted verticals, and potential future TTPs.
| | blog.valentin.sh
17.9 parsecs away

Travel
|