With the staggering amount of features that were introduced through HTML5 and CSS3 the attack surface of browsers grew accordingly. Consequently, it is no...
Author - Ruslan Habalov
Is dealing with Information Security issues for more than 10 years. Likes sophisticated challenges and is additionally interested in Artificial General Intelligence. [Read more...]
Hey PHP, those variables look like garbage don’t you agree? No? Well look again… tl;dr: We have found two use-after-free vulnerabilities in...
It all started by auditing Pornhub, then PHP and ended in breaking both… tl;dr: We have gained remote code execution on pornhub.com and have earned a...
If you want to use Linux as your main operating system and don’t want to do compromises like using a dual-boot solution with Windows there is an...
Hey folks, today I write about a (probably unknown) TeamSpeak 2 session hijacking vulnerability. TeamSpeak 2 is a voice-over-Internet Protocol (VoIP) software...