|
You are here |
evilpacket.net | ||
| | | | |
xvnpw.github.io
|
|
| | | | | In test of one application I have encountered bug in regex that leaded to Server Side Request Forgery (SSRF). Way of finding it was huge fun and excitement. It was also my first bug on production system ever. | |
| | | | |
citizen428.net
|
|
| | | | | bundler-audit is a small utility which can check your Gemfiles contents against the Ruby Advisory Database. You can simply run it via bundle audit and it will report insecure gem sources as well as library versions that have known vulnerabilities: $ bundle audit Insecure Source URI found: git://github.com/compass/compass-rails.git Insecure Source URI found: git://github.com/sinatra/sinatra.git Name: nokogiri Version: 1.8.2 Advisory: CVE-2018-8048 Criticality: Unknown URL: https://github.com/sparklemotion... | |
| | | | |
swordbytes.com
|
|
| | | | | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application. | |
| | | | |
postmarkapp.com
|
|
| | | Explore Postmark's MCP server-test email API features, send emails, and view stats instantly using simple prompts. No code or account setup needed. | ||