Calificación:
  • 0 voto(s) - 0 Media
  • 1
  • 2
  • 3
  • 4
  • 5
Últimos bugs [EN]
#NahamCon2022EU: Command-Line Data-Wrangling by Tomnomnom
https://www.youtube.com/watch?v=QSq-aYYQpro
Responder
Katana Framework: How To Use It To Scan And Mass Collect Website Data
https://medium.com/@sherlock297/katana-f...7f5ae326e0
Responder
Visualizing Live Hacking Events: Hackers Break Records at H1-702
https://www.hackerone.com/hackerone-comm...rds-h1-702
Responder
OTP Bypassing and Vulnerabilities from E-Mail fields.
https://akash-venky091.medium.com/otp-by...c326efa605
Responder
Race conditions: bug bounties
https://falkensmaze.medium.com/race-cond...6cd2fee6c1
Responder
Finding the next Log4j – OpenSSF’s Brian Behlendorf on pivoting to a ‘risk-centred view’ of open source development
https://portswigger.net/daily-swig/findi...evelopment
Responder
Bypassing SSRF Protections
https://medium.com/@tobydavenn/bypassing...e5e3ac31e9
Responder
CVE-2022-46175: JSON5 Prototype Pollution Vulnerability
https://securityonline.info/cve-2022-461...erability/
Responder
THE 2022 CURL SECURITY AUDIT
https://daniel.haxx.se/blog/2022/12/21/t...ity-audit/
Responder
Reverse engineering yet another ebook format
https://mijailovic.net/2022/12/25/hkpropel/
Responder


Salto de foro:


Usuarios navegando en este tema: 5 invitado(s)