Joern for Beginners: A How-To Guide for Source Code AnalysisThis article introduces the use of open source Joern for vulnerability mining, discussing specific tools and methods for identifying…Nov 25Nov 25
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 2Logic bugs in lending protocolsMar 30Mar 30
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 1This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend…Mar 29Mar 29
Analyzing the Google Chrome V8 CVE-2024–0517 Out-of-Bounds Code Execution VulnerabilityOverviewFeb 241Feb 241
Analysis of Glibc privilege escalation vulnerability “Looney Tunables” (CVE-2023–4911)Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability…Feb 21Feb 21
An In-Depth Analysis of Google Chrome Extension Vulnerabilities and SecuritySource :- https://tutorialboy24.blogspot.com/2023/11/an-in-depth-analysis-of-google-chrome.htmlNov 28, 20231Nov 28, 20231
Unveiling the Unauthenticated Command Execution Vulnerability in Cisco IOS XE System WebUIThis article will analyze and summarize the recent critical CVEs (CVE-2023–20198, CVE-2023–20273) in Cisco IOS XE.Nov 23, 2023Nov 23, 2023
Confluence Vulnerability (CVE-2023–22515): A Deep Dive into Atlassian Bamboo’s Chain Security…Source :- https://www.praetorian.com/blog/recent-confluence-vulnerability-cve-2023-22515-and-atlassian-bamboo/Nov 22, 2023Nov 22, 2023
Unveiling the Secrets of XSS Bypass: Harnessing JavaScript Symbols for Code ExecutionPrefaceNov 5, 2023Nov 5, 2023