Tag Archives: Research

CVE-2015-2349 – SuperWebMailer 5.50.0.01160 XSS (Cross-site Scripting) Web Security Vulnerabilities

CVE-2015-2349 – SuperWebMailer 5.50.0.01160 XSS (Cross-site Scripting) Web Security Vulnerabilities Exploit Title: CVE-2015-2349 – SuperWebMailer /defaultnewsletter.php” HTMLForm Parameter XSS Web Security Vulnerabilities Product: SuperWebMailer Vendor: SuperWebMailer Vulnerable Versions: 5.*.0.* 4.*.0.* Tested Version: 5.*.0.* 4.*.0.* Advisory Publication: March 11, 2015 Latest … Continue reading

Posted in Computer & Web Technology, IT Technology, Web Application Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Delaunay Triangulation – From 2-D Delaunay to 3-D Delaunay

Delaunay Triangulation – From 2-D Delaunay to 3-D Delaunay Author: Jing Wang Institute: School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore Delaunay triangulations are widely used in scientific computing in many diverse applications. While there are numerous algorithms … Continue reading

Posted in Article | Tagged , , , , , , , , , , , | Leave a comment