ASUS RT-AC68U web management interface suffers from a reflective cross site scripting vulnerability.
7ba8e8486a3d4055ad7a78d96b2f3cb20a29f14fd45f7d1245bd8fc10e936f97
ASUS RT-AC68U web management interface suffers from a remote command execution vulnerability.
7b176b54c84640f3cc5a4774305b03a76850a6c9f8faf88663140ab2d62a9bac
Privacy-Preserving IR: When Information Retrieval Meets Privacy and Security, also known as PIR Workshop 2014, has announced its Call For Papers. It will be held July 11, 2014 in Gold Coast, Australia.
e1e303b707135673aefdb374795d570799f7949384c538a1e28b2aaadaa6ed24
Google Voice discloses private and unknown numbers that have called you through its search functionality. This exploit helps perform a brute force attack against your contact list.
2739f68f433c91007b9fb24f4e39edbf7eaefc8f5952bef0152ce3eac0539310
ECE Projects suffers from a cross site scripting vulnerability.
be7a6e80f2bcf9b5552f29fecc0f7f219330cf62dd242782560185fb34bb6131
This whitepaper is a walk through on how to extract msgstore.db.crypt5 from WhatsApp on Android and using tools to break crypt5.
68ad521e10670bbb65c0d7b97ed8b497b83fd054c87bf2fe62d0596ebb035636
NCCGroup EasyDA suffers from a credential disclosure vulnerability due to misuse of /tmp.
5b7ef0d48812b65b840f408b3ca2c5a9a046d447cc42215e356f33637313da7a