Identifying vulnerabilities, taking responsibility, creating real security – and learning in a hands-on way: That’s what the Hacker Contest at TU...
SECURITY RESEARCH
Security Advisory on Cubro
The pentest professionals at usd HeroLab examined Cubro EXA48200 during the execution of their projects. A vulnerability was discovered in the User...
Security Advisories on SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad und Webswing
The pentest professionals at usd HeroLab examined SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad and Webswing during their...
From Unicode to Exploit: The Security Risks of Overlong UTF-8 Encodings
In the dynamic field of cybersecurity, it is often the obscure and long-forgotten vulnerabilities that pose a hidden threat to otherwise hardened...
Coffee Break with Pentesters: 5 Questions about Black Hat & DEF CON 2024
“Have you heard? We can present the CSTC at Black Hat again.” - This or something similar is how a chat at the coffee machine between Matthias...
Security Advisories on hugocms and Gitea
The pentest professionals at usd HeroLab examined hugocms and Gitea during their pentests. Thereby, several vulnerabilities were identified. The...
Security Advisory on AXIS Webcam
The pentest professionals at usd HeroLab examined the AXIS Webcam (P1364) during their pentests. Our professionals discovered a vulnerability...
Hacker Contest Challenge of Summer Semester 2024: Sample Solution online
This summer semester, the "Hacker Contest" will be taking place again at the Technical University (TU) Darmstadt and Darmstadt University of Applied...
Security Advisory on WeKan
The pentest professionals at usd HeroLab examined the open source application WeKan during their pentests. This application offers users a solution...
Security Advisory on Gambio
The pentest professionals at usd HeroLab examined the online shop software Gambio during their pentests. The software offers merchants various...
Security Advisories for SONIX and SAP
The pentest professionals at usd HeroLab examined SONIX Technology Webcam and SAP Fiori Sample Shop during their pentests. Our professionals...
The Surprising Complexity of Finding Known Vulnerabilities
IT security professionals need an efficient and reliable solution for identifying known vulnerabilities in a software product, given its name and...