Tag
#sql
The remote access trojan known as Gh0st RAT has been observed being delivered by an "evasive dropper" called Gh0stGambit as part of a drive-by download scheme targeting Chinese-speaking Windows users. These infections stem from a fake website ("chrome-web[.]com") serving malicious installer packages masquerading as Google's Chrome browser, indicating that users searching for the software on the
Prison Management System version 1.0 suffers from an unauthenticated remote shell upload vulnerability.
Multi Store Inventory Management System version 1.0 suffers from an insecure direct object reference vulnerability.
While the specifics for security testing vary for applications, web applications, and APIs, a holistic and proactive applications security strategy is essential for all three types. There are six core types of testing that every security professional should know about to secure their applications, regardless of what phase they are in in development or deployment. In this article, we will
Although there was a decrease in BEC engagements from last quarter, it was still a major threat for the second quarter in a row.
SIM Wisuda version 1.0 suffers from an insecure direct object reference vulnerability.
SLiMS CMS version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
StarTask CRM version 1.9 suffers from a remote SQL injection vulnerability that allows for authentication bypass.
Vencorp version 2.1.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass.