Noir – An Attack Surface Detector Form Source Code
Noir is an attack surface detector form source code. Key Features Automatically identify language and framework from source code. Find...
Noir is an attack surface detector form source code. Key Features Automatically identify language and framework from source code. Find...
Company Name: b'Acronis' Company HackerOne URL: https://hackerone.com/acronis Submitted By:b'cevans_0'Link to Submitters Profile:https://hackerone.com/b'cevans_0' Report Title:b'Missing brute force protection on login page...
Company Name: b'Mars' Company HackerOne URL: https://hackerone.com/mars Submitted By:b'ped_baq'Link to Submitters Profile:https://hackerone.com/b'ped_baq' Report Title:b'Html injection'Report Link:https://hackerone.com/reports/2061049Date Submitted:30 August 2023 A...
Company Name: b'Mars' Company HackerOne URL: https://hackerone.com/mars Submitted By:b'never_die'Link to Submitters Profile:https://hackerone.com/b'never_die' Report Title:b'Stored XSS + CSRF in "apellido" value'Report...
Company Name: b'Mars' Company HackerOne URL: https://hackerone.com/mars Submitted By:b'ractiurd'Link to Submitters Profile:https://hackerone.com/b'ractiurd' Report Title:b'Google dork lead to unsubscribe anyone from...
Company Name: b'Mars' Company HackerOne URL: https://hackerone.com/mars Submitted By:b'dd_06'Link to Submitters Profile:https://hackerone.com/b'dd_06' Report Title:b'CSRF to delete a pet'Report Link:https://hackerone.com/reports/2029753Date Submitted:30...
Company Name: b'Mars' Company HackerOne URL: https://hackerone.com/mars Submitted By:b'mo3giza'Link to Submitters Profile:https://hackerone.com/b'mo3giza' Report Title:b'Response Manipulation lead to bypass verification code...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family that's estimated to...
VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks that could be potentially exploited...
ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online threat landscape. Cybercriminals no longer...
Cybersecurity researchers have discovered malicious Android apps for Signal and Telegram distributed via the Google Play Store and Samsung Galaxy...
Recently disclosed security flaws impacting Juniper firewalls, Openfire, and Apache RocketMQ servers have come under active exploitation in the wild,...
An unknown threat actor is leveraging malicious npm packages to target developers with an aim to steal source code and...
A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late June...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...
NAME__________Sourcecodester Inventory Management System SQL injectionPlatforms Affected:Sourcecodester Inventory Management System 1.0Risk Level:6.5Exploitability:HighConsequences:Data Manipulation DESCRIPTION__________Sourcecodester Inventory Management System is vulnerable to...