Blog
Example: Critical SQL Injection in Authentication Module
A detailed analysis of a SQL injection vulnerability discovered in a popular web framework's authentication system.
Buffer Overflow in Industrial IoT Gateway
Analysis of a stack-based buffer overflow vulnerability in a popular industrial IoT gateway firmware.
SSRF to Cloud Metadata Service
Exploiting Server-Side Request Forgery to extract AWS credentials from EC2 metadata service.