NCC Group Research Blog
Oracle Retail Invoice Manager SQL Injection
1 year 2 months ago
Oracle Hyperion 11 Directory Traversal
1 year 2 months ago
Oracle Java Installer Adds a System Path Which is Writable by All
1 year 2 months ago
Oracle Passwords and OraBrute
1 year 2 months ago
Oracle Forensics Part 7 Using the Oracle System Change Number in Forensic Investigations
1 year 2 months ago
Oracle Gridengine sgepasswd Buffer Overflow
1 year 2 months ago
Oracle Forensics Part 5: Finding Evidence of Data Theft in the Absence of Auditing
1 year 2 months ago
Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin
1 year 2 months ago
Oracle Forensics Part 3: Isolating Evidence of Attacks Against the Authentication Mechanism
1 year 2 months ago
Oracle Forensics Part 4: Live Response
1 year 2 months ago
Oracle Forensics Part 1: Dissecting the Redo Logs
1 year 2 months ago
Oracle Forensics Part 2: Locating Dropped Objects
1 year 2 months ago
Oracle 11g TNS listener remote Null Pointer Dereference
1 year 2 months ago
Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges
1 year 2 months ago
Oracle 11g TNS listener remote Invalid Pointer Read
1 year 2 months ago
Optimizing Pairing-Based Cryptography: Montgomery Multiplication in Assembly
1 year 2 months ago
Optimum Routers: Researching Managed Routers
1 year 2 months ago
Open Banking: Security considerations & potential risks
1 year 2 months ago
Optimizing Pairing-Based Cryptography: Montgomery Arithmetic in Rust
1 year 2 months ago
Checked
2 hours 8 minutes ago
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
NCC Group Research Blog feed