This article discusses a vulnerability test conducted on a school’s award submission platform. It covers issues such as privilege escalation, file upload and do
This article discusses the audit of vulnerabilities in a mini Taobao platform built with Spring Boot. It focuses on identifying issues related to Fastjson comma
Explore the unusual 403 bypass technique used in a recent penetration test on redacted.com. Learn how changing case sensitivity led to gaining access to the adm
Explore common login logic vulnerabilities such as weak passwords, brute force attacks, and CAPTCHA bypass. Discover practical solutions to enhance web applicat
Explore the security vulnerability of an electric arcade app's WeChat one-click login feature. Discover how to exploit it by accessing shared preferences and ex
Explore the basic concepts and processes of Java code auditing to ensure your applications are secure. Learn about different types of risks and how to identify,