eWAPTXv2 Certification and Course Review

We are excited to announce that one of our cyber security experts in the team was awarded the eWAPTX certificate by successfully passing the eLearnSecurity Web application Penetration Tester eXtreme…

Read More
OpenEMR 0-day Stored XSS Vulnerability (CVE-2022-24643)

OpenEMR is a web application software written using PHP programming to create a hospital information management system. When the software is downloaded through Github or SourceForge, the source code will…

Read More
OpenEMR 0-day Incorrect Access Control Vulnerability (CVE-2022-25041)

OpenEMR is a web application software written using PHP programming to create a hospital information management system. When the software is downloaded through Github or SourceForge, the source code will…

Read More
The Most Common Mobile Application Vulnerabilities

Our mobile application penetration testing expert conducted a study on the Google Play market, selecting about 100 mobile applications at random and statically analyzing them with QARK to discover…

Read More
OpenEMR 0-day IDOR Vulnerability (CVE-2022-25471)

OpenEMR is a medical practice management software which also supports Electronic Medical Records (EMR). It is ONC Complete Ambulatory EHR certified and features fully integrated electronic medical records, practice management…

Read More
openSIS Student Information System 0-day Vulnerability (CVE-2021-41691)

openSIS is one of several free and open-source student information systems available to K-12 and higher education institutions. The solution is a web-based application developed and maintained by Open Solutions…

Read More
Log4Shell: Log4j 0-day Remote Code Execution Vulnerability (CVE-2021-44228 & CVE-2021-45046)

Log4j is a Java logging library that allows developers to log messages from their applications. A vulnerability has been found in Log4J that could allow an attacker to execute arbitrary…

Read More
Google Chrome Vulnerability Worth for $6K: Use After Free (CVE-2021-30573)

As the S4E team, we are always interested in new vulnerabilities and challenging bounty programs. Although we focus on customer feedback on our products in the early stage of our…

Read More