Explore >> Select a destination


You are here

parsiya.net
| | positive.security
9.8 parsecs away

Travel
| | Chaining a misconfiguration in IE11/Edge Legacy with an argument injection in a Windows 10/11 default URI handler and a bypass for a previous Electron patch, we developed a drive-by RCE exploit for Windows 10. The main vulnerability in the ms-officecmd URI handler has not been patched yet and can also be triggered through other browsers (requires confirmation of an inconspicuous dialog) and desktop applications that allow URI opening.
| | www.nodejs-security.com
13.9 parsecs away

Travel
| | Stop storing secrets in environment variables. It's a bad practice and only fits hobby or side projects with no real business impact. Here are all the reasons why you should never store secrets in environment variables and how to do it better.
| | blog.securityinnovation.com
13.6 parsecs away

Travel
| | Command Injection allows attackers to inject commands into software and then execute them with the software's privileges. Here's how to test for them.
| | blog.qasource.com
71.1 parsecs away

Travel
| Read this blog to understand the most important trends in network penetration testing in improving security and why to partner with QASource.