サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
ドラクエ3
www.evonide.com
With the staggering amount of features that were introduced through HTML5 and CSS3 the attack surface of browsers grew accordingly. Consequently, it is no surprise that interactions between such features can cause unexpected behavior impacting the security of their users. In this article, we describe such a practical attack and the research behind it. tl;dr: We (co-)discovered a side-channel vulne
It all started by auditing Pornhub, then PHP and ended in breaking both… tl;dr: We have gained remote code execution on pornhub.com and have earned a $20,000 bug bounty on Hackerone. We have found two use-after-free vulnerabilities in PHP’s garbage collection algorithm. Those vulnerabilities were remotely exploitable over PHP’s unserialize function. We were also awarded with $2,000 by the Internet
このページを最初にブックマークしてみませんか?
『www.evonide.com』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く