|
You are here |
www.vuxml.org | ||
| | | | |
mazinahmed.net
|
|
| | | | | Application and Infrastructure Security Engineering | |
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues. | |
| | | | |
packetstormsecurity.com
|
|
| | | | | Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers | |
| | | | |
www.miguelxpn.com
|
|
| | | XSS stands for Cross Site Scripting, it's basically when input is not properly sanitized somewhere and a malicious actor can inject unintended javascript somewhere. That javascript will be executed by some unsuspecting user's browser and then bad stuff can happen. | ||