Category: cybersecurity |
|
| | |
| |
www.datadoghq.com
|
|
| | |
| |
Learn how the Log4Shell vulnerability works, how to detect it, and how Datadog can help you secure your systems.
|
| | |
| |
blog.jitendrapatro.me
|
|
| | |
| |
[AI summary] The blog post details the discovery and disclosure of multiple vulnerabilities in the Idno PHP CMS software. The author, Jitendra Patro, outlines four specific vulnerabilities: 1) Insecure Direct Object References (IDOR) via IDOR, 2) XSS via SVG files, 3) Password Reset Poisoning through HTTP Host header injection, and 4) Improper URL construction. The author attempted to disclose the vulnerabilities responsibly to the Idno security team but received no response, leading to public disclosure. The post emphasizes the importance of coordinated vulnerability disclosure and the value of learning through security research.
|
| | |
| |
blog.kotowicz.net
|
|
| | |
|
A blog on security, malware, cryptography, pentesting, javascript, php and whatnots
|