Tag: Common Vulnerabilities Back to HomeHome Common Vulnerabilities Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Education External Penetration Test OSINT Problems DNS Zone Transfers: A Classic Risk Still Overlooked What are DNS Zone Transfers? While DNS zone transfers may seem like a relic of the past, they remain a … By: Matt Schmidt July 7, 2025 3 Min Read Education XMPie uStore Vulnerabilities Discovered Recently during an External Penetration Test, Triaxiom discovered several flaws/vulnerabilities within a commercial-off-the-shelf (COTS) eCommerce platform called XMPie uStore. In … By: Matt Schmidt February 2, 2022 5 Min Read Education CVEs and Responsible Disclosures: What are they? CVEs and responsible disclosures are both important items and steps to securing software and making the Internet a more secure … By: Matt Schmidt May 13, 2021 2 Min Read Education Web Application Penetration Test An Overview of PHP Type Juggling Creating secure web applications is hard. There are a number of reasons for this, but one contributing factor is language-specific … By: JR Johnson July 23, 2020 2 Min Read Web Application Penetration Test Common Web Application Vulnerabilities – Insecure Deserialization In starting to prepare for the Offensive Security Advanced Web Application Exploitation (AWAE) course, I ran across a vulnerability category … By: JR Johnson July 9, 2020 3 Min Read Vulnerability Walkthrough Web Application Penetration Test File Upload Validation Techniques File upload filtering is an extremely important part of web application security that is also notoriously hard to get right. … By: JR Johnson June 30, 2020 4 Min Read Education Web Application Penetration Test Common Web Application Vulnerabilities – JWTs We've been running across a lot of modern web applications lately that have implemented JSON Web Tokens (also known as … By: JR Johnson May 27, 2020 4 Min Read Load more
Education External Penetration Test OSINT Problems DNS Zone Transfers: A Classic Risk Still Overlooked What are DNS Zone Transfers? While DNS zone transfers may seem like a relic of the past, they remain a … By: Matt Schmidt July 7, 2025 3 Min Read
Education XMPie uStore Vulnerabilities Discovered Recently during an External Penetration Test, Triaxiom discovered several flaws/vulnerabilities within a commercial-off-the-shelf (COTS) eCommerce platform called XMPie uStore. In … By: Matt Schmidt February 2, 2022 5 Min Read
Education CVEs and Responsible Disclosures: What are they? CVEs and responsible disclosures are both important items and steps to securing software and making the Internet a more secure … By: Matt Schmidt May 13, 2021 2 Min Read
Education Web Application Penetration Test An Overview of PHP Type Juggling Creating secure web applications is hard. There are a number of reasons for this, but one contributing factor is language-specific … By: JR Johnson July 23, 2020 2 Min Read
Web Application Penetration Test Common Web Application Vulnerabilities – Insecure Deserialization In starting to prepare for the Offensive Security Advanced Web Application Exploitation (AWAE) course, I ran across a vulnerability category … By: JR Johnson July 9, 2020 3 Min Read
Vulnerability Walkthrough Web Application Penetration Test File Upload Validation Techniques File upload filtering is an extremely important part of web application security that is also notoriously hard to get right. … By: JR Johnson June 30, 2020 4 Min Read
Education Web Application Penetration Test Common Web Application Vulnerabilities – JWTs We've been running across a lot of modern web applications lately that have implemented JSON Web Tokens (also known as … By: JR Johnson May 27, 2020 4 Min Read