Security
Headlines
HeadlinesLatestCVEs

Tag

#sql

Student Attendance Management System 1.0 Insecure Settings

Student Attendance Management System version 1.0 suffers from an ignored default credential vulnerability.

Packet Storm
#sql#vulnerability#web#windows#google#php#auth#firefox
Building Your First Web Application with Yii Framework

Did you know that over 80% of web applications fail due to poor planning and execution? Now imagine…

Student Study Center Management System 1.0 Insecure Settings

Student Study Center Management System version 1.0 suffers from an ignored default credential vulnerability.

Student Management System 1.0 Insecure Settings

Student Management System version 1.0 suffers from an ignored default credential vulnerability.

Sistem Penyewaan Baju atau Pakaian Berbasis Web 1.0 SQL Injection

Sistem Penyewaan Baju atau Pakaian Berbasis Web version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

Simple Student Quarterly Result / Grade System 1.0 Insecure Settings

Simple Student Quarterly Result / Grade System version 1.0 suffers from an ignored default credential vulnerability.

Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks

Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) systems from five manufacturers that could expose them to remote attacks. "These vulnerabilities pose significant real-world risks, as they could be exploited by malicious actors to cause widespread damage, including physical damage, environmental hazards, and economic losses," Bitsight researcher

Could Security Misconfigurations Become No. 1 in OWASP Top 10?

As Superman has kryptonite, software has weaknesses — with misconfigurations leading the pack.

How to Plan and Prepare for Penetration Testing

As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion” techniques is especially alarming.