PinnedParagBagulinSystem WeaknessXML-RPC Vulnerabilities : A Penetration Testing ApproachAn Introduction to XML-RPC: Understanding the Basics of Remote Procedure CallJan 15, 2023Jan 15, 2023
PinnedParagBagulPreventing Cross-Site Scripting (XSS) Attacks with the HTML Special Characters Function in PHPIntroduction:Jan 11, 2023Jan 11, 2023
PinnedParagBagulinSystem WeaknessHow I found Moodle Cross site scriptingHello folks , I’m a Parag Bagul security Researcher and bug bounty hunterSep 7, 2022Sep 7, 2022
PinnedParagBagulHow I was able to Bypass Famous Company AuthenticationThis article is based on a new finding in which I discovered the nacos authentication bypass vulnerability on Philips website which leads…Sep 10, 20221Sep 10, 20221
ParagBagulMastering WordPress Security Effective Strategies Against Cyber ThreatsHi I’m Parag Bagul, a security researcher. In this blog post, we’ll explore how to boost your WordPress site’s security using the…Jun 16, 2023Jun 16, 2023
ParagBagulCamaleon CMS SSTI Vulnerability (CVE-2023–30145) Explored: A Path to Remote Code ExecutionSomething about me 👨🏻💻Jun 7, 2023Jun 7, 2023
ParagBagulMy Journey Finding HTML Injection Vulnerability in a popular British Accountancy platformAs a security enthusiast, I’ve always been fascinated by finding vulnerabilities in websites and web applications. I discovered a stored…Mar 2, 20231Mar 2, 20231
ParagBagulNFS: The Deep Dive into Vulnerability Assessment and Exploitation TechniquesIntroduction:Feb 19, 2023Feb 19, 2023
ParagBagulinSystem WeaknessChasing the Hackers: A Network Forensics InvestigationIn this blog, I will be diving deep into the Chase challenge, a network forensic challenge where we uncover the hackers’ trail and gain…Jan 22, 2023Jan 22, 2023