About 10 results
Open links in new tab
  1. THE ASYNCHRONOUS PROBLEM Blind + background thread Nightly cronjob Blind + event-‐triggered Second order SQLi, command injection... Blind XSS Blind + no time delay Blind XXE, XPath...

  2. Template injection can also arise by accident, when user input is simply concatenated directly into a template. This may seem slightly counter-intuitive, but it is equivalent to SQL Injection vulnerabilities …

  3. Abstract PDF documents and PDF generators are ubiquitous on the web, and so are injection vulnerabilities. Did you know that controlling a measly HTTP hyperlink can provide a foothold into the …

  4. Some websites parse email addresses to extract the domain and infer which organisation the owner belongs to. This pattern makes email-address parser discrepancies critical. Predicting which domain …

  5. Why join the hunt Obvious vulnerabilities are dwindling Evasive vulnerabilities are accumulating Becoming essential for high-value targets

  6. While this feature is crucial for referencing any resource from a relative path, it's also the source of many vulnerabilities. It's possible to exploit dot-segment normalization by leveraging the discrepancies …

  7. A partial history of desync attacks 2004: "HTTP Request Smuggling" – Watchfire (largely forgotten) 2016: "Hiding wookies in HTTP" – Regilero (largely ignored) 2019: Exploit header parser …

  8. Cache Key Injection - Akamai Another classically unexploitable issue is client-side vulnerabilities affecting keyed headers, for example, XSS in the Origin header:

  9. Hackability Created to test capabilities of unknown web rendering engines