Latest posts

All
fashion
lifestyle
sports
tech

Trending News

Popular

phpMyFAQ 2.9.8 – Cross-Site Request Forgery(CSRF)
Staying ahead of censors in 2025: What we’ve learned from fighting censorship in Iran and Russia
Attempts to Bypass CDNs – SANS Internet Storm Center
An AI Dark Horse Is Rewriting the Rules of Game Design

phpMyFAQ 2.9.8 – Cross-Site Request Forgery(CSRF)

# Exploit Title: phpMyFAQ 2.9.8 – Cross-Site Request Forgery(CSRF) # Date: 2024-10-26 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/thorsten/phpMyFAQ # Software Link: https://github.com/thorsten/phpMyFAQ # Version: 2.9.8 # Tested on: Ubuntu Windows # CVE : CVE-2017-15734 PoC: Get http://phpmyfaq/admin/index.php?action=clear-visits Reproduction: While still logged in, open another browser window to access the link. …

Read More

Staying ahead of censors in 2025: What we’ve learned from fighting censorship in Iran and Russia

From internet blackouts in Iran to Russia’s evolving censorship tactics, 2025 has tested Tor’s anti-censorship tools like never before. These are the moments where the work of Tor’s anti-censorship team is more important than ever, to fulfill our mission of preserving connectivity between users in affected regions and the rest of the world. In this…

Read More

An AI Dark Horse Is Rewriting the Rules of Game Design

The video game Valorant, a fast-paced team-based shooter, has recently become a testing ground for a promising new direction in artificial intelligence research. The game’s developers at Riot Games (a Tencent subsidiary) are using 3D-native AI models to prototype new characters, scenes, and storylines, according to a researcher familiar with the company’s efforts who spoke…

Read More

MaNGOSWebV4 4.0.6 – Reflected XSS

# Exploit Title: MaNGOSWebV4 4.0.6 – Reflected XSS # Date: 2024-10-26 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/paintballrefjosh/MaNGOSWebV4 # Software Link: https://github.com/paintballrefjosh/MaNGOSWebV4 # Version: 4.0.6 # Tested on: Ubuntu Windows # CVE : CVE-2017-6478 PoC: // Access the vulnerable URL and trigger the XSS payload GET http://mangoswebv4/install/index.php?step=%3Cscript%3Ealert(1)%3C/script%3E [Replace Your Domain…

Read More

Django 5.1.13 – SQL Injection

# Exploit Title: Django 5.1.13 – SQL Injection # Google Dork: [none] # Not applicable for this vulnerability # Date: 2025-12-03 # Exploit Author: Wafcontrol Security Team # Vendor Homepage: https://www.djangoproject.com/ # Software Link: https://www.djangoproject.com/download/ # Version: 5.2 before 5.2.8, 5.1 before 5.1.14, 4.2 before 4.2.26 (possibly earlier versions like 5.0.x, 4.1.x, 3.2.x) # Tested…

Read More