Email address | private |
---|---|
First Active | 2014-12-12 |
Last Active | 2018-08-26 |
Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.
e3fe6d3322b4e7bf37f04eb80df88cf1ff50256ec220546413ce1608ec796227
This paper discusses different techniques that an attacker can use to bypass NoScript Security Suite Protection. These techniques can be used by malicious vectors in bypassing the default installation of NoScript. The paper also provides solutions and recommendations for end-users that can enhances the current protection of NoScript Security Suite.
5f37e8e3412f1440fa6c6a360ed379f128cc4ea278c023e5f3855760b77ba3a5
This whitepaper documents shortcomings in various popular web application firewalls (WAFS) and how to trigger cross site scripting attacks regardless of the protections in place. Covered are F5 Big IP, Imperva Incapsula, AQTRONIX WebKnight, PHP-IDS, Mod-Security, Sucuri, QuickDefense, and Barracuda WAF.
c38f62eb042bf845f286dc56c557e0a4422de464a3d9658b8fd2d013a1a708c2
W3 Total Cache version 0.9.4 suffers from a cross site request forgery vulnerability.
6b5a5b055312a8b9ac869d31da7a50ad0789008ca253cbb4e6f4c154da8a7063