7 links tagged with all of: vulnerabilities + web-security
Click any tag below to further narrow down your results
Links
This article outlines the updated OWASP Top Ten list for 2025, highlighting critical web application security risks. It introduces two new categories and shifts existing ones based on survey data and trends in software vulnerabilities. Each category is defined by specific weaknesses, helping organizations focus on key security issues.
Reflectiz offers a solution that continuously monitors and manages web threats like tracking pixels and malicious scripts. It helps organizations identify vulnerabilities in their websites and implement security measures effectively. The service operates remotely, simplifying the integration process.
This article explores how differing syntax interpretations across programming languages can lead to security vulnerabilities. It outlines techniques for creating payloads that exploit these ambiguities, allowing attackers to bypass filters and perform unauthorized actions. Practical examples and case studies illustrate the potential impact of syntax confusion.
Researchers found that hackers are using the React2Shell vulnerability to compromise NGINX web servers, redirecting traffic for malicious purposes. This can lead to malware infections and damage to an organization's reputation. CSOs are advised to secure server configurations and apply the latest security patches.
This article examines early instances of cache poisoning vulnerabilities from various platforms like HackerOne and GitHub. It details how attackers exploited misconfigurations to compromise web applications, leading to severe impacts, including redirects, denial of service, and XSS attacks.
The article discusses the persistence of Cross-Site Scripting (XSS) vulnerabilities in modern web frameworks, exploring the underlying reasons that contribute to this issue. It emphasizes the challenges developers face in mitigating XSS threats despite advancements in security practices and tools. Insights into the complexity of web application development and the balance between functionality and security are also provided.
A collection of payloads and bypass techniques aimed at enhancing web application security is provided, encouraging community contributions. It includes structured resources such as README files, Burp Intruder sets, and relevant images, along with guidance for creating new chapters. Additional related projects and resources are also mentioned for further exploration.