Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers. Threat actors started exploiting a high-severity MongoDB ...
Abstract: With the introduction of a large number of malicious vulnerabilities in open source software, traditional vulnerability mining methods have a large number of invalid and lack of targeted ...
A critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in arbitrary code execution under certain circumstances. The ...
NetHawk is a personal project developed as part of a Cybersecurity and Ethical Hacking course. It was created with educational purposes in mind, allowing me to put into practice core concepts in ...