Security Notes
search
⌘Ctrlk
Security Notes
  • redhatWhoami
  • Notes
  • Portswigger Labs
    • XSS
    • DOM XSS
    • SQL Injection
    • Access Control
    • Authentication Bypass
    • Business Logic
    • Information Disclosure
    • File Upload Vulnerabilities
    • Deserialization
    • Prototype Pollution
    • API Testing
    • SSTI
    • JSON Web Tokens ( JWT )
    • SSRF
    • CSRF
    • Cross-Origin Resource Sharing
    • Command Injection
    • XXE
  • owsap-top-10:2025
    • A10 Mishandling of Exceptional Conditions
    • A09 Security Logging and Alerting Failures
    • A08 Software or Data Integrity Failures
    • A07 Authentication Failures
    • A06 Insecure Design
    • A05 Injection
    • A04 Cryptographic Failures
    • A03 Software Supply Chain Failures
    • A02 Security Misconfiguration
    • A01 Broken Access Control
  • write up
  • How I Turned an Image Upload Feature into Full Server Access Using DNS Queries
  • How I Discovered a Dependency Confusion Vulnerability in a Ruby Application Leading to RCE
  • Privilege Escalation via Impersonation Features feature
  • How I Escalated Simple HTML Injection to SSRF via PDF Rendering
  • How I was able to discover ATO Via IDOR vulnerability
  • how I Bypassed SAML Authentication, and had access to Admin Panel.
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Portswigger Labs

XSSchevron-rightDOM XSSchevron-rightSQL Injectionchevron-rightAccess Controlchevron-rightAuthentication Bypasschevron-rightBusiness Logicchevron-rightInformation Disclosurechevron-rightFile Upload Vulnerabilitieschevron-rightDeserializationchevron-rightPrototype Pollutionchevron-rightAPI Testingchevron-rightSSTIchevron-rightJSON Web Tokens ( JWT )chevron-rightSSRFchevron-rightCSRFchevron-rightCross-Origin Resource Sharingchevron-rightCommand Injectionchevron-rightXXEchevron-right
Previoushttp 80chevron-leftNextXSSchevron-right