Explore >> Select a destination


You are here

taeluralexis.com
| | www.modzero.ch
2.8 parsecs away

Travel
| | [AI summary] This advisory details critical vulnerabilities in Cisco IP phones' web interfaces that allow remote attackers to gain full control of the devices without authentication. The vulnerabilities include buffer overflow, path traversal, and CSRF weaknesses, which can be exploited to install backdoors, exfiltrate data, and use the phones as attack vectors.
| | xvnpw.github.io
2.4 parsecs away

Travel
| | Server-Side Request Forgery (SSRF) vulnerabilities have been around for a long time, and they still pose a significant threat to web applications, so much so this kind of vulnerability has been included in OWASP TOP 10. This time I will explain how to mitigate SSRF vulnerability in Go applications.
| | introvertmac.wordpress.com
2.8 parsecs away

Travel
| | During my early years in bug bounty programs and security research, I observed firsthand how crypto projects-even those with robust blockchain protocols-often crumble due to overlooked Web2 vulnerabilities. In my 2020 blog post, Common Security Issues with Crypto Websites and APIs, I highlighted prevalent issues such as injection attacks, broken authentication, and insufficient authorization. At...
| | www.legitsecurity.com
19.1 parsecs away

Travel
| Legit Security | Don't Miss These Emerging Trends in Cloud Application Security. Get details on trends and best practices in cloud application security.