Contact us Get Quote

Research


FEATURED

Value Addition of Source Code Review

This article presents some of the important issues that requires an in-depth Source Code Review exercise.

Read More

Published On Title
2014-09-10 Top 5 Vulnerabilities that surely need a Source Code Review
2014-04-25 Ruby on Rails Penetration Testing Notes
2014-03-05 Presentation on Malware and APT
2013-06-13 Tracing and Extraction of runtime injected code
2013-01-25 Approach for identification of remote code injection
2012-12-23 A brief overview of CWMP Security

Data Title # Status
2015-04-23 Microsoft Office vulnerability ZDI-CAN-2897 Pending
2015-04-23 Microsoft Office vulnerability ZDI-CAN-2896 Pending
2015-04-21 Microsoft Office vulnerability ZDI-CAN-2898 Pending
2015-04-03 Microsoft Internet Explorer vulnerability ZDI-CAN-2811 Pending
2015-03-10 Microsoft Office 2010 vulnerability ZDI-CAN-2789 Pending
2015-03-10 Microsoft Office 2010 vulnerability ZDI-CAN-2788 Pending
2015-01-03 Microsoft Office 2010 vulnerability CVE-2015-1650 Pending
2014-10-02 HP SiteScope vulnerability ZDI-CAN-2567 Pending
2014-10-02 HP SiteScope vulnerability ZDI-CAN-2566 Pending
2014-10-02 HP SiteScope vulnerability ZDI-CAN-2565 Pending
2014-09-10 Microsoft Office 2010 vulnerability CVE-2015-0085 Reported
2014-08-12 IBM Tivoli Endpoint Manager vulnerability CVE-2014-6113 Published
2014-07-30 Microsoft Office 2010 vulnerability CVE-2014-4117 Published