Seda BOLATinSystem WeaknessJSON WEB TOKEN (JWT)A standard mechanism for transferring cryptographically signed JSON data between systems is JSON web tokens (JWTs). They are typically…3d ago3d ago
Seda BOLATinSystem WeaknessDOM BASED CROSS-SITE SCRIPTING (DOM BASED XSS)XSS (Cross-Site Scripting)Jun 26, 2023Jun 26, 2023
Seda BOLATinSystem WeaknessINSECURE DIRECT OBJECT REFERENCE (IDOR)The Insecure Direct Object References (IDOR) vulnerability is a web application vulnerability in which an attacker can gain unauthorized…Dec 31, 2022Dec 31, 2022
Seda BOLATTMUXI will tell you about the TMUX tool, which will facilitate its operation in terminal use. TMUX is a terminal alternative that offers…Nov 15, 2022Nov 15, 2022
Seda BOLATinSystem WeaknessPROXYNOTSHELL VULNERABILITYZero-day vulnerabilities CVE-2022–41040 (Server-Side Request Forgery (SSRF)) and CVE-2022–41082 (Remote Command Execution (RCE)) named…Nov 8, 2022Nov 8, 2022
Seda BOLATPROXYNOTSHELL ZAFİYETİEylül 2022’de; 2013, 2016 ve 2019 Microsoft Exchange sunucularının etkilendiği ProxyNotShell olarak adlandırılan CVE-2022–41040 (Sunucu…Oct 13, 20222Oct 13, 20222