CAPTURE CREDENTIALS VIA BROWSER REFRESH
EXPLOITING IMPROPER REDIRECTION IN PHP WEB APPLICATIONS
PHISHING THROUGH BASE-64 ENCODED REFLECTIVE HTML INJECTION
SOURCE CODE DISCLOSURE OVER HTTP
BYPASSING IIS 6 ACCESS RESTRICTIONS
CROSS SITE FILE UPLOAD FORGERY MOZILLA FIREFOX 4
XSS IN JOOMLA ACAJOOM COMPONENT
FILE UPLOAD VULNERABILITY IN FCKEDITOR
EXPLOITING LFI IN CO-HOSTING ENVIRONMENT
SECURITY THREAT DUE TO PROXY CACHE
"Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut