Actualités
Recevez toute l'actualité en avant-première
septembre 9, 2016
Nuit du Hack – The backstages Not only challenge maker, all the team wanted to explain you what the CTF means for them. Let’s discover what they have to say…
En savoir plusseptembre 9, 2016
*Plus qu’un jeu ou une compétition* À la manière des compétitions sportives, symbolisées par le « fair play », le respect, la cohésion d’équipe, les tournois électroniques occupent aujourd’hui une...
En savoir plusjuillet 19, 2016
FOG is a free, open source, computer cloning and management solution. We found several vulnerabilities in Fog, a free and open source computer cloning and management solution : a SQL...
En savoir plusjuillet 6, 2016
Several XSS vulnerabilities have been found on several pages of the administration panel. Reflected XSS may lead to session hijacking on admin user. Several vulnerabilities have been discovered between 2015,...
En savoir plusjuillet 6, 2016
Horsys is a human resource appliation, allowing the user to manage his profile, vacation, position title and other personnal data like address, phone number and so on. The application runs...
En savoir plusavril 21, 2016
When using the « database backup/logging on filesystem » feature, iThemes security generates a weak filename allowing attackers to obtain the backup/log file if they know when the backup/log file was generated...
En savoir plusavril 21, 2016
A vulnerability has been found in iThemes Security backup function that may allow attackers to gain access to backup/log files.
En savoir plusmars 16, 2016
Multiple CSRF vulnerabilities have been found in the Mail interface of Zimbra 8.0.9 GA Release, giving possibilities to change account preferences like mail forwarding.
En savoir plusmars 16, 2016
A critical vulnerability has been found in Proxmox VE 3 (OpenVZ) and Proxmox VE 4 beta 1 (LXC) in the virtual machine creating form allowing authenticated remote users to overwrite...
En savoir plus- ← Précédent
- 1
- …
- 8
- 9
- 10
- 11
- 12
- …
- 19
- Suivante →