Vulnerability Analysis

CMSMAP – A SIMPLE VULNERABILITY SCANNER

CMSMap aims to be a centralized solution for not only one, but up to four of the most popular CMS in terms of vulnerability detection, Unlike WPScan. CMSmap is an open source project written in Python that helps automate the process of vulnerability scanning and detection in WordPress, Joomla, Drupal, and Moodle. This tool is not …

CMSMAP – A SIMPLE VULNERABILITY SCANNER Read More »

WPScan : Scan WordPress Site for Vulnerability

WordPress is very popular Content Management System (CMS). It is used by diverse range of users by different purposes and areas. This makes WordPress project very dynamic and rich. The security of the wordpress is important because of the its user base. There are also a lot of different plugins which can create security holes …

WPScan : Scan WordPress Site for Vulnerability Read More »

WhatsApp Protocol Decryption for Chat Manipulation and More

According to sources, WhatsApp, the Facebook-owned messaging application has over 1.5 billion users in over 180 countries. The average user checks WhatsApp more than 23 times per day. And, the number of WhatsApp users in USA is predicted to grow to 25.6 million by 2021. Given all the chatter, the potential for online scams, rumors and …

WhatsApp Protocol Decryption for Chat Manipulation and More Read More »

Vulnerability In Microsoft Login System Could Allow Account Hijacking

A serious security vulnerability existed in the Microsoft login system. Researchers who found this flaw suspected that exploiting the flaw could lead to account hijacking. Microsoft Login System Vulnerability Reportedly, researchers from Israeli security firm CyberArk have discovered a serious vulnerability in the Microsoft login system. Exploiting the vulnerability could allow account takeovers by potential …

Vulnerability In Microsoft Login System Could Allow Account Hijacking Read More »

Critical Remote Code Execution Flaw Found in Open Source rConfig Utility

The network configuration management utility has two unpatched critical remote code execution vulnerabilities. Two bugs in the network configuration utility rConfig have been identified, both allowing remote code execution on affected systems. Worse, one is rated critical and allows for a user to attack a system remotely – sans authentication. RConfig is a free open-source …

Critical Remote Code Execution Flaw Found in Open Source rConfig Utility Read More »