CNA-Training

Counting Examples

  1. https://www.openbugbounty.org/incidents/152371/
  2. http://www.openwall.com/lists/oss-security/2014/05/14/4
  3. https://www.securityfocus.com/archive/1/517207/30/0/threaded
  4. http://seclists.org/oss-sec/2014/q3/300
  5. https://www.exploit-db.com/exploits/17872/
  6. http://seclists.org/fulldisclosure/2015/Jul/120
  7. http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/
  8. https://www.riskbasedsecurity.com/research/RBS-2016-004.pdf
  9. https://support.citrix.com/article/CTX138627
  10. https://blogs.gentoo.org/ago/2017/04/27/imageworsener-two-left-shift/
  11. https://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/