The Rapid7 Blog:
Your Signal in the Security Noise
Insights, stories, and guidance from our global security and research teams.
Featured posts
271 Results

Vulnerabilities and Exploits
R7-2015-22: ManageEngine Desktop Central 9 FileUploadServlet connectionId Vulnerability (CVE-2015-8249)
Tod Beardsley

Vulnerabilities and Exploits
What is SQL Injection?
Trey Ford

Vulnerabilities and Exploits
8 Reasons Why SQL Injection Vulnerabilities Still Exist
Kim Dinerman

Vulnerabilities and Exploits
R7-2015-17: HP SiteScope DNS Tool Command Injection
Tod Beardsley

Vulnerabilities and Exploits
Multiple Insecure Installation and Update Procedures for RStudio (R7-2015-10) (FIXED)
Tod Beardsley

Vulnerabilities and Exploits
Using Reflective DLL Injection to exploit IE Elevation Policies
Juan Vazquez

Vulnerabilities and Exploits
Exploiting a 64-bit browser with Flash CVE-2015-5119 (Part 2)
Juan Vazquez

Vulnerabilities and Exploits
Exploiting a 64-bit browser with Flash CVE-2015-5119
Juan Vazquez

Vulnerabilities and Exploits
Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)
Tod Beardsley

Vulnerabilities and Exploits
R7-2015-08: Accellion File Transfer Appliance Vulnerabilities (CVE-2015-2856, CVE-2015-2857)
Tod Beardsley

Vulnerabilities and Exploits
What Exactly is Duqu 2.0?
Tim Stiller

Vulnerabilities and Exploits
Remote Coverage for MS15-034 HTTP.sys Vulnerability (CVE-2015-1635)
csong

Vulnerabilities and Exploits
Breaking down the Logjam (vulnerability)
Maria Varmazis

Vulnerabilities and Exploits
How Poisonous is VENOM (CVE-2015-3456) to your Virtual Environments?
Tod Beardsley

Vulnerabilities and Exploits
A Closer Look at February 2015's Patch Tuesday
Justin Pagano

Vulnerabilities and Exploits
R7-2015-02: Google Play Store X-Frame-Options (XFO) Gaps Enable Android Remote Code Execution (RCE)
Tod Beardsley

Vulnerabilities and Exploits
GHOSTbuster: How to scan just for CVE-2015-0235 and keep your historical site data
Snow Tempest

Vulnerabilities and Exploits
GHOST in the Machine - Is CVE-2015-0235 another Heartbleed?
Jen Ellis

Vulnerabilities and Exploits
POODLE Jr.: The Revenge - How to scan for CVE-2014-8730
Snow Tempest

Vulnerabilities and Exploits
R7-2014-18: Hikvision DVR Devices - Multiple Vulnerabilities
rep

Vulnerabilities and Exploits
R7-2014-15: GNU Wget FTP Symlink Arbitrary Filesystem Access
HD Moore