Injection Dangerous Command into HARMAN AMX
Affected Vendor: AMX – https://www.amx.com/
Affected Software: MVP5150 Firmware
Affected Version: Tested on V2.87.13
Issue type: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
Release Date: 07/05/2019
Discovered by: Harold Zang, Hivint
CVE Identifier: CVE-2019-11224
Issue status: Publish
Upload Malicious File in Kentico CMS
Affected Vendor: Kentico – https://www.kentico.com
Affected Software: Kentico CMS
Affected Version: Tested on 11.0
Issue type: Unrestricted Upload of File with Dangerous Type
Release Date: 08/01/2019
Discovered by: Harold, Hivint
CVE Identifier: CVE-2018-19453
Issue status: Fixed (Hotfix 11.0.45)
ezXSS is a XSS platform that can test (blind) Cross Site Scripting, steal cookies and other attacks. It is a open source XSS platform, you can find the source code in Github. However, the original source did not give NGINX Rewrite rules.
This article will show you ezXSS NGINX rewrite rules.Therefore, you can build your ezXSS with NGINX.
Apache Solr is highly reliable, scalable and fault tolerant, providing distributed indexing, replication and load-balanced querying, automated failover and recovery, centralized configuration and more. You can find more information by clicking this link.
This article shows that how to use CVE-2017-12629 to attack it.
When you install docker form ubuntu source, you may cannot install the lasted version. It may lead to you cannot implement your environment or have a error when you running your project.
This article will show you how to uninstall and install the lasted version docker on Ubuntu Linux 16.04.2.
For more information, please read the offical website.
Recently, Apache released Apache httpd 2.4.26. And 2.4.26 fix a lot of issues. You can find the detail in this link. One of the issue is CVE-2017-7659. This article will discuss this issue and show the payload.
This article tell you how to reverse and inject your own code to Android Application. Therefore you can get sensitive information, Series Number or other information.
L2TP and IPSec are two different protocol. An IPSec can encrypts your network communication. After using VPN, your internet traffic will be encrypted. This link will teach you more knowledge about L2TP & IPSec. This article will teach you how to deploy and configure L2TP & IPSec on EC2 Ubuntu Server.