-
### Preconditions and environment
Any Version of Magento using the Nginx sample config
### Steps to reproduce
Navigate to `https://site.com/setup/`
### Expected result
Return a 401/403 error, or …
-
Earlier this week some researchers of Ruhr University Bochum published a conference paper on insecure features in PDF, based on a systematic review of the full format spec:
There's a good summ…
-
Hi,
Using the docker branch, I tried to find the exploits of WEB-INF/web.xml with these links:
http://localhost:8098/wavsep/WEB-INF (copy)/web.xml
http://localhost:8098/wavsep/WEB-INF - Copy/web.xml
…
-
-
**Abstract**
Bug Bounty is an initiative that rewards individuals for discovering and responsible reporting software security vulnerabilities. White hat hackers use their skills for finding bugs and…
-
Anyone who wishes to contribute any scan signatures found in their web server logs, please send a Pull Request on the [exploits.list file](https://github.com/mitchellkrogza/Fail2Ban.WebExploits/blob/m…
-
Hi, nice project you got going on there. Sorry for the issue, just want to add my 2 cents.
I probably have the same cheap Chinese camera and am trying to figure out how to get a stream out of it to…
-
So not sure how accurate the exploits are that the Exploit Finder finds online but i highly doubt the exploits it found are are all the working exploits.
I'm just curious if you can give some feedback…
-
@samyk how do you feel about breaking out the exploits into independent modules (e.g. network hijacking, cookie siphoning, remote web backdoors, remote router backdoor) that can distributed through NP…
-