CF Summit East 2024 Recap

Last week was the 2024 edition of CF Summit East in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

CF Summit East 2024 Recap

Last week was the 2024 edition of CF Summit East in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

CF Summit East 2024 Recap

Last week was the 2024 edition of CF Summit East in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

Left and Right Accept Negative Counts

8 ) { //strip https:// website = right(website, len(website)-8); } As long as you are doing that kind of check, you should not have any issue with unexpected change of behavior due to this change.

From: Pete Freitag's Homepage

Left and Right Accept Negative Counts

8 ) { //strip https:// website = right(website, len(website)-8); } As long as you are doing that kind of check, you should not have any issue with unexpected change of behavior due to this change.

From: Pete Freitag's Homepage

Left and Right Accept Negative Counts

8 ) { //strip https:// website = right(website, len(website)-8); } As long as you are doing that kind of check, you should not have any issue with unexpected change of behavior due to this change.

From: Pete Freitag's Homepage

Bypassing Imperva SecureSphere WAF (CVE-2023-50969)

Background Imperva SecureSphere Web Application Firewall (WAF) is an on-premise security solution to inspect, monitor and block traffic to web applications.

From: Hoya Haxa - A Security Research Blog

Bypassing Imperva SecureSphere WAF (CVE-2023-50969)

Background Imperva SecureSphere Web Application Firewall (WAF) is an on-premise security solution to inspect, monitor and block traffic to web applications.

From: Hoya Haxa - A Security Research Blog

Bypassing Imperva SecureSphere WAF (CVE-2023-50969)

Background Imperva SecureSphere Web Application Firewall (WAF) is an on-premise security solution to inspect, monitor and block traffic to web applications.

From: Hoya Haxa - A Security Research Blog

Speaking at CF Summit East 2024

The kind folks at Adobe have invited me back to speak at CF Summit East 2024 in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

Speaking at CF Summit East 2024

The kind folks at Adobe have invited me back to speak at CF Summit East 2024 in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

Speaking at CF Summit East 2024

The kind folks at Adobe have invited me back to speak at CF Summit East 2024 in Washington DC.

From: South of Shasta: Software Development, Web Design, Training

Defending Against CVE-2024-20767 (ColdFusion Arbitrary File System Read)

Technical details for CVE-2024-20767 (ColdFusion Arbitrary File System Read) from APSB24-14 have now been publicly disclosed by the researcher who reported it to Adobe PSIRT:  https://jeva.

From: Hoya Haxa - A Security Research Blog

Defending Against CVE-2024-20767 (ColdFusion Arbitrary File System Read)

Technical details for CVE-2024-20767 (ColdFusion Arbitrary File System Read) from APSB24-14 have now been publicly disclosed by the researcher who reported it to Adobe PSIRT:  https://jeva.

From: Hoya Haxa - A Security Research Blog

Defending Against CVE-2024-20767 (ColdFusion Arbitrary File System Read)

Technical details for CVE-2024-20767 (ColdFusion Arbitrary File System Read) from APSB24-14 have now been publicly disclosed by the researcher who reported it to Adobe PSIRT:  https://jeva.

From: Hoya Haxa - A Security Research Blog

Fixinator fixes unscoped variables

Last week's Adobe ColdFusion security update disabled searchImplicitScopes by default.

From: Pete Freitag's Homepage

Fixinator fixes unscoped variables

Last week's Adobe ColdFusion security update disabled searchImplicitScopes by default.

From: Pete Freitag's Homepage

If You're Running an Intranet Connections Lucee Instance, Ensure That You've Change the Default Lucee Admin Password

Last week, researchers at Sprocket Security wrote about post-exploitation in Lucee via malicious extensions.

From: Hoya Haxa - A Security Research Blog

If You're Running an Intranet Connections Lucee Instance, Ensure That You've Change the Default Lucee Admin Password

Last week, researchers at Sprocket Security wrote about post-exploitation in Lucee via malicious extensions.

From: Hoya Haxa - A Security Research Blog