■■■□□ #GoodReport
How We Found Another #XSS in #Google with #Acunetix
https://www.acunetix.com/blog/web-security-zone/xss-google-acunetix/
How We Found Another #XSS in #Google with #Acunetix
https://www.acunetix.com/blog/web-security-zone/xss-google-acunetix/
Acunetix
How We Found Another XSS in Google with Acunetix | Acunetix
Some time ago, we found an XSS in Google Cloud with the help of the Acunetix vulnerability scanner. Recently we found another XSS vulnerability. Here is how it happened.
■■□□□ #GoodReport #XXE via File upload (#SVG)
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/
■■■□□ #GoodReport: LFI + file upload = #RCE (#CodeExecution)
https://medium.com/@armaanpathan/chain-the-bugs-to-pwn-an-organisation-lfi-unrestricted-file-upload-remote-code-execution-93dfa78ecce
https://medium.com/@armaanpathan/chain-the-bugs-to-pwn-an-organisation-lfi-unrestricted-file-upload-remote-code-execution-93dfa78ecce
Medium
Chain The Bugs to Pwn an Organisation ( LFI + Unrestricted File Upload = Remote Code Execution )
Hi everyone, After completing my OSCP certification I thought to give a try to bug bounty, as OSCP has sharpened my exploitationSkills.