How White-Box hacking works: webERP Local File Inclusion
In the previous post we described a couple of inoERP bugs and made a conclusion that inoERP software is too buggy […]
Read More →In the previous post we described a couple of inoERP bugs and made a conclusion that inoERP software is too buggy […]
Read More →Researchers transfer files to compromised hosts with a couple of techniques as the host configuration may vary. I can briefly remember […]
Read More →We chose to improve security of the InoERP application by the next reasons: Alive forum. However, as the vendor pretended to […]
Read More →