-
攻擊者學號:B10732002 @isgordon458
被攻擊者學號與網址:B10830027 @mandy900619 https://demo.mandy.social/
漏洞類型:(XSS)
漏洞描述
在上傳貼文處有 XSS inejection
PoC
登入網頁後,在上傳貼文處新增一則貼文,其內容為
```
alert(1)
```
![imag…
-
Does this issue occur when all extensions are disabled?: Yes
- VS Code Version: 1.94.0 (Universal)
- OS Version: macOS Sonoma 14.7
Steps to Reproduce:
1. Perform a `git com…
-
I changed wlan0mon to wlan1mon, after running I getting this:
```
PHY Interface Driver Chipset
phy0 p2p0 ?????? Not pci, usb, or sdio
phy0 wlan0 …
-
### What is the issue with the Fetch Standard?
A `header name` has to match the `field-name` syntax (which is token) and does not allow all kind of values such as 0x00.
The specifications do not see…
-
### Domain
_No response_
### What is actually missing?
Hi @t0bst4r
Please support running Matterbridge behind Reverse Proxy. I use Traefik and I run all my containers behind it including Home Ass…
-
The CSRFProtectionFilter uses the `X-Requested-By` header, which is fine and meets proper CSRF protection criteria. However- the [OWASP cheat sheet](https://www.owasp.org/index.php/Cross-Site_Request_…
-
攻擊者學號:B10715036 @a24230928
被攻擊者學號與網址:B10815040 @tonatfish http://52.170.251.78:8080
漏洞類型:XSS(bypass patch)、CSRF(delete)、CSRF(comment)
漏洞描述
可繞過之前的 XSS Patch 執行 JS 並進行 CSRF 攻擊。
攻擊者可以在留言板上留下以下…
-
The 4th byte of the RAR signature is wrong - it should be 21 and not 20.
Additionally, the last byte is not always zero - it's a version number 00 (RAR 1.5 to 4.0) or 01 (RAR 5) with values 02 thr…
-
Nik,
First of all great work! I wanted to write something like you did but stumbled on your code and was pretty impressed!
I have been having an issue though whenever I hit back button with CortesyF…
-
https://developer.mozilla.org/en-US/observatory/analyze?host=fined.academy