Explore >> Select a destination


You are here

evilpacket.net
| | xvnpw.github.io
7.2 parsecs away

Travel
| | In test of one application I have encountered bug in regex that leaded to Server Side Request Forgery (SSRF). Way of finding it was huge fun and excitement. It was also my first bug on production system ever.
| | citizen428.net
12.8 parsecs away

Travel
| | bundler-audit is a small utility which can check your Gemfiles contents against the Ruby Advisory Database. You can simply run it via bundle audit and it will report insecure gem sources as well as library versions that have known vulnerabilities: $ bundle audit Insecure Source URI found: git://github.com/compass/compass-rails.git Insecure Source URI found: git://github.com/sinatra/sinatra.git Name: nokogiri Version: 1.8.2 Advisory: CVE-2018-8048 Criticality: Unknown URL: https://github.com/sparklemotion...
| | swordbytes.com
14.8 parsecs away

Travel
| | SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf's Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the "overwolfstore://" URL handler. This vulnerability allows remote unauthenticated attackers to execute arbitrary commands on the underlying operating system that hosts Overwolf's Client Application.
| | postmarkapp.com
77.9 parsecs away

Travel
| Explore Postmark's MCP server-test email API features, send emails, and view stats instantly using simple prompts. No code or account setup needed.