New Vulnerability Families Feature From December 2018, Netsparker will report similar vulnerabilities in groups rather than individually. This means that vulnerability reports will be shorter, simpler and more accurate. It also means that the task of fixing vulnerabilities will take less time and effort.
Exploiting a Microsoft Edge Vulnerability to Steal Files This blog post documents our Security Researcher Ziyahan Albeniz’s experiment in exploiting a Microsoft Edge browser vulnerability. He explains how a combination of SOP, the ability to email clickable links and a vulnerability in both the Windows Mail and Calendar applications actually enable the exploit. It includes his Proof of Exploit video.
Type Juggling Authentication Bypass Vulnerability in CMS Made Simple Our researcher, Sven Morgenroth, explains how he found an Authentication Bypass in CMS Made Simple, what PHP Type Juggling is, and why you should never use the unserialize function together with user-supplied input.
ROBOT Attack Revives a 19-Year Old Vulnerability The ROBOT Attack revives a 19-year old Oracle vulnerability first discovered and reported by Daniel Bleichenbacher in 1998. It involves sending Client Key Exchange messages with wrong paddings while a TLS-RSA handshake is being negotiated. Vulnerable servers then enabled hackers to decrypt ciphertext or sign data.
Grammarly Vulnerability Allows Attackers To See Sensitive Data of Their Customers Our security researcher discusses the potential implications of the cross-site request forgery (CSRF) issue found in Grammarly and the importance of cross-site request forgery protection.
Exploiting SSTI and XSS in the CMS Made Simple Web Application Our Security Researcher found a vulnerability in a parameter in a URL in the address bar of the browser. Read more about how he did it, and how he was able to exploit it to carry out a few harmless changes.
Collision Based Hashing Algorithm Disclosure This detailed article explains how you can use the Collision Based Hashing Algorithm Disclosure method to check if the target web application uses the weak SHA-1 hashing algorithm to hash the users’ passwords.
Preventing Cross-site Scripting Vulnerabilities When Developing Ruby on Rails Web Applications This article uses examples to explain how to develop secure web applications in Ruby on Rails that are not vulnerable to cross-site scripting vulnerabilities.