Unlocking the Power and Risks of RSQL: A Deep Dive into Its Real-World Use and Security…If you’ve ever built a complex API and needed to provide powerful filtering capabilities to your users, chances are you’ve come across RSQL…4d ago4d ago
Unveiling GitHub Security Pitfalls: Using Runners to Exploit Repository Data1. What is a GitHub Workflow?Feb 11Feb 11
Bloxone Business logic flaw due to thick client vulnerabilities — CVE-2024-46505Introduction:Dec 18, 20241Dec 18, 20241
sensitive information disclosure due to improper access control CVE-2020–15390Hi Everyone,Apr 12, 2021Apr 12, 2021
CROSS SITE SCRIPTING IN PEGA CVE-2020–23957While testing an application that deployed using the Pega framework I came across this reflected cross-site scripting vulnerability and…Dec 13, 2020Dec 13, 2020
WhiteSource Log injection Vulnerability-CVE -2020-5304Log Injection Vulnerability Description:Jun 5, 2020Jun 5, 2020