TR | WAF Sistemlerini ve Uygulama Filtrelerini Atlatma Teknikler
https://www.exploit-db.com/docs/33074.pdf
https://www.exploit-db.com/docs/33074.pdf
Machine Learning and Cyber Security Resources
http://fsecurify.com/machine-learning-and-cyber-security/
http://fsecurify.com/machine-learning-and-cyber-security/
PwnScriptum (PHP Mailer Remote Code Execution) Zafiyeti
https://www.netsparker.com.tr/blog/web-guvenligi/Meraklisi-icin-PwnScriptum-Zafiyeti-PHP-Mailer-Remote-Code-Execution/
https://www.netsparker.com.tr/blog/web-guvenligi/Meraklisi-icin-PwnScriptum-Zafiyeti-PHP-Mailer-Remote-Code-Execution/
Netsparker - Web Uygulaması Güvenlik Tarayıcısı
Meraklısı İçin PwnScriptum (PHP Mailer Remote Code Execution) Zafiyeti
PHP Mailer'de tespit edilen PwnScriptum'dan hareketle, diğer kütüphanelerde de benzer yollarla açığa çıkan zafiyetin teknik ayrıntıları.
[render.bitstrips.com] Stored XSS via an incorrect avatar property value
https://hackerone.com/reports/159878
https://hackerone.com/reports/159878
HackerOne
Snapchat disclosed on HackerOne: [render.bitstrips.com] Stored XSS...
While modifying an avatar, an attacker has the opportunity to submit XSS payloads as its property values. The resulting png file will return a 500 error with the payload in the response body. The...
Forwarded from دیالوگ های ماندگار💂
تف به این شانس ... چرا هرکاری که ما توش خبره ایم غیرقانونیه ؟!
📽 Butch Cassidy and the Sundance Kid (1969)
🎭 @dialoghmandegar
📽 Butch Cassidy and the Sundance Kid (1969)
🎭 @dialoghmandegar
https://hackerone.com/reports/188743
xxe in DOD 😐
xxe in DOD 😐
HackerOne
U.S. Dept Of Defense disclosed on HackerOne: XXE on DoD web server
A Department of Defense webserver was vulnerable to an XML External Entity (XXE) processing vulnerability. dawgyg was able to exploit this vulnerability by crafting an XML request that revealed...