0xrzforVoorivex's Teamblog.voorivex.team·Oct 14, 2023Uncovering a Command Injection, $2400 BountyHello, in this write-up I will explain how I found four P1 and two P2 bugs and showed multiple attack scenarios. Recon Usually, the first thing I do to get started on wide-scope programs is to find the ASNs and CIDRs of the company, through which I c...Discuss·6 likes·1.2K readsRemote Code Execution
Haneunhanlee.hashnode.dev·Aug 29, 2023Operating System Commands by Http RequestDefinition Operating system command execution vulnerabilities are weaknesses that allow malicious users to execute malicious code or induce abnormal behavior within a system using the commands of the operating system. List of Vulnerability Trigger Po...DiscussCyber Security#cybersecurity
Snyksnyksec.hashnode.dev·Sep 7, 2022How to find and fix XML entity vulnerabilitiesXML is a human-readable text format used to transport and store structured data. Tags and data structures are defined by users in self-describing documents that are universally parsable by any XML tool, giving developers a highly configurable mechani...Discussxml
Greg MagolanforAspect Blogblog.aspect.dev·Sep 6, 2022Bazel + TypeScript: faster with Remote ExecutionThis post will show how much faster TypeScript builds can be when using remote execution, Bazel's unique ability to parallelize transpile and type-check work across a farm of machines. We hope that Bazel 6.0 will include fixes for symlinks support, m...Discuss·1 like·2.1K readsbazel
Allan Diegoallandiego-xgodgodx.hashnode.dev·Jun 25, 2022Toxic - Hack the boxE ai tudo Ok? Hoje será a resolução do challenge Toxic - Hack the Box. Obs: Para começar o reconhecimento deste desafio é necessário fazer o download dos arquivos do web site dentro da plataforma do hack the box. Reconhecimento Depois de fazer o d...Discuss·36 readshack-the-box