Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.
Get Feederblog.assetnote.io
Get the latest updates from Assetnote directly as they happen.
Follow now 40 followers
Last updated over 1 year ago
about 2 years ago
If you work in the hospitality industry, it’s quite likely that you...
about 2 years ago
Summary An attacker can obtain the JNDI connection name through servlets that...
about 2 years ago
cPanel is a web hosting control panel software that is deployed widely...
about 2 years ago
Summary A reflected cross-site scripting vulnerability can be exploited without any authentication...
over 2 years ago
Introduction Many enterprise organizations that deal with large amounts of data that...
over 2 years ago
For those who haven’t had the pleasure, Avaya Aura is a (rather...
over 2 years ago
Introduction At Assetnote, we often audit enterprise software source code to discover...
over 2 years ago
Over the last ten years, we have seen the industrialization of the...
over 2 years ago
Introduction Methodology Exploitation But why does this work Vendor Response Remediation Advice...
almost 3 years ago
TL;DR Jira is vulnerable to SSRF which requires authentication to exploit. There...
almost 3 years ago
Summary Jira Core & Jira Service Desk are vulnerable to server-side request...
almost 3 years ago
Introduction Once in a while, you come across the perfect storm of...