With the growing use of mobile applications, the security of these applications has become a key...
Security misconfiguration represents one of the most common vulnerabilities in cloud environments. In...
Today I was reviewing my Telegram channels and realized that I hadn't written a summary of my "first...
Server-Side Request Forgery (SSRF) is a critical vulnerability that allows an attacker to force a...
Server-Side Template Injection is a vulnerability that arises when user input is improperly processed...
Recently, an Authorization Bypass vulnerability was discovered in the Next.js framework (one of the...
Monolog is a PHP logging library that sends logs to files, websockets, databases and other web...
WebDAV (Web-based Distributed Authority Version) is a legacy protocol that can be defined as an...
You know that vulnerability that says "the developer must have the intention to collaborate with an...
In Bug Bounty programs, it's extremelly common to find subdomains without a defined index,...
One of the most basic bugs present in insecure OAuth 2.0 implementations is the possibility of...
Today I bring a recent case, when analyzing the authentication flow of an application, I observed a...
Introduction Amazon Cognito is a delegated service for providing...
Subdomain Takeover is a domain hijacking technique and occurs when there is a CNAME (Canonical Name,...
Imagine that during an engagement you come across a static website, with only an image on the home...
Who has never analyzed a website and ended up causing an error and discovered that the server was in...
In this post, we will explore CVE-2021-40438, which is an SSRF vulnerability in Apache mod_proxy...
Nginx is undoubtedly one of the most widely used web servers (which also has other features such as...