Research papers

litespeed cache vulnerability
WordPress LiteSpeed Cache Vulnerability [CVE-2020-29172]
Read More
microsoft mshtml remote code execution vulnerability
Microsoft MSHTML Remote Code Execution [CVE-2021-40444]
Read More
printnightmare vulnerability
PrintNightmare Vulnerability [CVE 2021-1675 & CVE-2021-34527]
Read More
apache http server
Vulnerabilities in Apache HTTP Server [CVE 2021-42013]
Read More
owasp top 10 web application security threats and standards
OWASP Top 10 Web Application Security Threats and Standards
Read More
polkit vulnerability
Polkit Authentication Bypass Local Privesc Vulnerability
Read More
curveball cryptoapi spoofing vulnerability
CurveBall - CryptoAPI Spoofing Vulnerability [CVE-2020-0601]
Read More
hivenightmare-aka-serious-sam
HiveNightmare aka Serious SAM (CVE 2021-36934)
Read More
android 11 PIP vulnerability
Android 11 PIP Vulnerability
Read More
Detecting and protecting your smartphone from PEGASUS Spyware
Detecting and protecting your smartphone from PEGASUS Spyware
Read More
xml external entity injection via mp3 file upload on wordpress
XML External Entity Injection via MP3 file upload on WordPress
Read More
spoofing downloaded filename’s extension in chromium
Spoofing Downloaded Filename’s Extension in Chromium
Read More
es flle explorer android app vulnerability
Android Vulnerability in ES File Explorer
Read More
cms made simple vulnerability
CMS Made Simple Exploit Explained [CVE-2020-10682]
Read More
chrome browser filereader vulnerability
Chrome Browser FileReader (UAF) Vulnerability
Read More
heap based buffer overflow vulnerability research paper
Heap-based overflow vulnerability in Sudo CVE 2021-3156
Read More
ubuntu overlays privesc vulnerability
Ubuntu OverlayFS Local Privesc Vulnerability
Read More
windows win32k elevation of privilege vulnerability
Windows Win32k Elevation of Privilege Vulnerability
Read More
heartbleed attack cybersecurity research paper
Heartbleed Attack - What it is and How does it work by Safe Security
Read More
blind ssrf with shellshock exploitation
Blind SSRF with Shellshock Exploitation
Read More
linux firewall guide research paper
A Beginners Guide to Linux firewall
Read More
injection attacks research paper
Injection Attacks Analysis: SQL Injection, Host Header, etc.
Read More
insecure deserialzation research paper
Introduction to insecure deserialization
Read More
linux privilege escalation research paper
A hands-on approach to Linux Privilege Escalation
Read More
what is social enginnering research paper
Deep Insight into Social Engineering
Read More
zerologon vulnerability exploit research paper
Understanding and Exploiting Zerologon
Read More
apache ghostcat vulnerability research paper
Apache Ghostcat CVE 2020-1938
Read More
smb ghost vulnerability cybersecurity research paper
SMBGhost CVE 2020-0796
Read More
url exploit xxe to srf
URL Exploiting XXE to SSRF
Read More