(Move to ...)
Colaboradores / links
Aprende Hacking Gratis
Biblioteca de hacking
Hacking Tools
DEEP WEB LINKS
▼
Showing posts with label
CVE
.
Show all posts
Showing posts with label
CVE
.
Show all posts
Anatomy of a SHA-3 Overflow: Mitigating Exploits in Cryptographic Libraries
›
The digital fortress is under constant siege. While the headlines blare about massive data breaches, the insidious threats often lurk in t...
Anatomy of a GitLab RCE and a PHP Supply Chain Attack: Defending Against Insecure Deserialization and Argument Injection
›
The digital shadows lengthen, and whispers of vulnerabilities echo through the network. This week, we're dissecting not one, but a t...
Unveiling Hidden GitLab Reports & Golang Parameter Smuggling: A Bug Bounty Deep Dive
›
The digital shadows lengthen, and the whispers of vulnerabilities grow louder. This summer, the bug bounty hunting grounds churned with di...
Anatomy of CVE-2022-30190 (Follina): A Threat Hunter's Deep Dive into Microsoft Office Exploitation
›
The digital shadows are vast, and sometimes, the most dangerous threats emerge not from the dark corners of the web, but from the very to...
How is Vulnerability Criticality Measured? CVE, CVSS, Scoring Systems, and Tools
›
Table of Contents Introduction: The Silent Threat Assessment What are Vulnerabilities? The Role of CVE: A Universal Identifier CVSS:...
Understanding Common Vulnerabilities & Exposures (CVE): A Defender's Blueprint
›
The digital underworld is a constant hum of whispers and shadows. In this labyrinth of code and data, anomalies are the breadcrumbs of cha...
Chrome's Zero-Day Exploitation: A Deep Dive into CVE-2021-21193 and Defensive Strategies
›
The digital frontier is a battlefield, and the latest salvo comes from an unexpected quarter: Google Chrome. Reports surfaced around Mar...
›
Home
View web version