9.5.2
Discover another location where ERPNext uses the render function to execute user-provided code.
Read More
9. ERPNext Authentication Bypass and Server Side Template Injection
+ Render a static file dynamically based on the context of the request and user.
Read More
802.11 Options
* [Capturing WPA2-PSK Handshakes](Wireless#Capturing-WPA2-PSK-Handshakes)
Read More
8. DotNetNuke Cookie Deserialization RCE
*.NET deserialization vulnerability in the XMLSerializer Class*
Read More
7.5
The student user home directory contains a sub-directory named bassmaster_extramile. In this directory we slightly modified the Bassmaster original code to harden the exploitation of the vulnerabil...
Read More
6.8.2 (Incomplete)
Use the SQL injection we discovered in this module to create a large object and retrieve the assigned LOID without the use of blind injection. Adapt your final proof of concept accordingly in order...
Read More