Home

postgraduální škola Maturitní album NEPRAVDIVÉ javascript guess vulnerability Zmrazit kód dlaždice

DEADFACE CTF 2022 Writeup
DEADFACE CTF 2022 Writeup

Security risks of ChatGPT and other AI text generators | SC Media
Security risks of ChatGPT and other AI text generators | SC Media

API security, vulnerabilities and common attacks
API security, vulnerabilities and common attacks

Prototype pollution: The dangerous and underrated vulnerability impacting  JavaScript applications | The Daily Swig
Prototype pollution: The dangerous and underrated vulnerability impacting JavaScript applications | The Daily Swig

Tutorgeeks: XSS in Apigee - Google Acquisition
Tutorgeeks: XSS in Apigee - Google Acquisition

markstats on Twitter: "Additional graph shows how often European clubs  attempt long throw-ins and the outcome (xGD10) Brentford - positive, many  long throw-ins Barcelona - positive, close to zero long throw-ins Bayern -
markstats on Twitter: "Additional graph shows how often European clubs attempt long throw-ins and the outcome (xGD10) Brentford - positive, many long throw-ins Barcelona - positive, close to zero long throw-ins Bayern -

WebKit RegExp Exploit addrof() walk-through
WebKit RegExp Exploit addrof() walk-through

What is cross-site scripting (XSS)? | Tutorial & examples | Snyk Learn
What is cross-site scripting (XSS)? | Tutorial & examples | Snyk Learn

Learning Web Pentesting With DVWA Part 3: Blind SQL Injection
Learning Web Pentesting With DVWA Part 3: Blind SQL Injection

10 API Security Vulnerabilities You Need To Be Aware Of (Along with REST  API Overview) | by Santosh Shinde | JavaScript in Plain English
10 API Security Vulnerabilities You Need To Be Aware Of (Along with REST API Overview) | by Santosh Shinde | JavaScript in Plain English

Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs | WIRED
Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs | WIRED

M1 security vulnerability 'baked into chip,' but it doesn't matter ... -  9to5Mac
M1 security vulnerability 'baked into chip,' but it doesn't matter ... - 9to5Mac

PS4 Webkit FontFace vulnerability: Sleirsgoevy publishes new Proof Of  Concept, asks for tests with firmware 9.00 - Wololo.net
PS4 Webkit FontFace vulnerability: Sleirsgoevy publishes new Proof Of Concept, asks for tests with firmware 9.00 - Wololo.net

New Research: Security Report Finds Ed Tech Vulnerability That Could Have  Exposed Millions of Students to Hacks During Remote Learning – The 74
New Research: Security Report Finds Ed Tech Vulnerability That Could Have Exposed Millions of Students to Hacks During Remote Learning – The 74

Patrick Walton on Twitter: "This just in: Rust is useless because everyone  who can write Rust already writes safe C code. I guess I've just been  imagining every browser vulnerability of the
Patrick Walton on Twitter: "This just in: Rust is useless because everyone who can write Rust already writes safe C code. I guess I've just been imagining every browser vulnerability of the

Stealing private data with a CSS injection | Invicti
Stealing private data with a CSS injection | Invicti

OWASP Top 10 Security Risks & Vulnerabilities 2020 | Sucuri
OWASP Top 10 Security Risks & Vulnerabilities 2020 | Sucuri

String Concatenation and Format String Vulnerabilities | Invicti
String Concatenation and Format String Vulnerabilities | Invicti

Salt Labs | Traveling with OAuth - Account Takeover on Booking.com
Salt Labs | Traveling with OAuth - Account Takeover on Booking.com

Remote code execution vulnerability exposed in popular JavaScript  serialization package | The Daily Swig
Remote code execution vulnerability exposed in popular JavaScript serialization package | The Daily Swig

Meltdown (security vulnerability) - Wikipedia
Meltdown (security vulnerability) - Wikipedia

javascript - Accidentally locked an XSS vulnerable input - Information  Security Stack Exchange
javascript - Accidentally locked an XSS vulnerable input - Information Security Stack Exchange

Prototype pollution: The dangerous and underrated vulnerability impacting  JavaScript applications | The Daily Swig
Prototype pollution: The dangerous and underrated vulnerability impacting JavaScript applications | The Daily Swig

Insecure Direct Object Reference (IDOR) Vulnerability - GeeksforGeeks
Insecure Direct Object Reference (IDOR) Vulnerability - GeeksforGeeks

Unauthenticated Remote Code Execution in Spotify's Backstage
Unauthenticated Remote Code Execution in Spotify's Backstage

Enter "Sandbreak" - Vulnerability In vm2 Sandbox Module Enables Remote Code  Execution (CVE-2022-36067)
Enter "Sandbreak" - Vulnerability In vm2 Sandbox Module Enables Remote Code Execution (CVE-2022-36067)

fuji 🌸 on Twitter: "jumping on the bandwagon to bring my ship dynamic.  you'll never guess the ship https://t.co/BQ9XehoGDo" / Twitter
fuji 🌸 on Twitter: "jumping on the bandwagon to bring my ship dynamic. you'll never guess the ship https://t.co/BQ9XehoGDo" / Twitter

Vulnerabilities in modern web applications
Vulnerabilities in modern web applications