Source |
Checkpoint |
Identifiant |
263829 |
Date de publication |
2015-08-04 13:30:05 (vue: 2015-08-04 13:30:05) |
Titre |
Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part I |
Texte |
In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […]
|
Envoyé |
Oui |
Condensat |
acts all appeared blog bug check core creating deleting describing discovered editing finding first flaws from him his hunter hunter’s injection leading long netanel only part path performing persistent point post posts read researcher rubin series sql story subscriber tells three through trilogy user vulnerabilities vulnerability way wordpress wordpress: xss |
Tags |
Guideline
|
Stories |
|
Notes |
|
Move |
|
Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2015-08-11 18:46:37 |
(Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part II – Supremacy (lien direct) |
In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS […]
|
Guideline
|
|
|
|
2015-09-15 15:27:27 |
(Déjà vu) Finding Vulnerabilities in Core WordPress: A Bug Hunter\'s Trilogy, Part III – Ultimatum (lien direct) |
In this series of blog posts, Check Point vulnerability researcher Netanel Rubin tells a story in three acts – describing his long path of discovered flaws and vulnerabilities in core WordPress, leading him from a read-only 'Subscriber' user, through creating, editing and deleting posts, and all the way to performing SQL injection and persistent XSS attacks on […]
|
Guideline
|
|
|