by Muhammad Arooj | Sep 27, 2017 | Botpicks, Security
OpenText Documentum Administrator version 7.2.0180.0055 and Documentum Webtop version 6.8.0160.0073 suffer from XML external entity injection vulnerabilities. advisories | CVE-2017-14526, CVE-2017-14527 MD5 | 0cf5e2fc80eb45dd8b9bba4f36f8f1b5 Download Title:...
by Muhammad Arooj | Jul 7, 2017 | Botpicks, Digital, Hacking, Programming, Security
#!/usr/bin/python “”” Lepide Auditor Suite createdb() Web Console Database Injection Remote Code Execution Vulnerability Vendor: http://www.lepide.com/ File: lepideauditorsuite.zip SHA1: 3c003200408add04308c04e3e0ae03b7774e4120 Download:...
by Muhammad Arooj | Jul 6, 2017 | Botpicks, Hacking, Programming, Security
It’s common for modern browser exploits to attempt to transform a memory safety vulnerability into a method of running arbitrary native code on a target device. This technique is most preferred since it allows the attackers to accomplish their means with least...
by Muhammad Arooj | Jul 4, 2017 | Programming, Security
Humax Digital HG100R multiple vulnerabilities Device: Humax HG100R Software Version: VER 2.0.6 – Backup file download (CVE-2017-7315) An issue was discovered on Humax Digital HG100R 2.0.6 devices, a modem commonly used by ISPs to provide ADSL internet service to...
by Muhammad Arooj | Jul 3, 2017 | Programming, Security
All the programming you’d need to perform strictly machine learning related tasks you can learn “on the job”. Programming and thinking like a computer scientists are valuable skills on their own, and I think everyone should introduce themselves to...
by Muhammad Arooj | May 14, 2017 | Hacking, Security
This is a screenshot of Wana Decryptor, the ransomware that has hit 99 countries so far. Read below to thoroughly understand how to prevent yourself against such an attack. So what is Ransomeware? Ransomware Trojans are a type of cyberware that is designed to...
Recent Comments