appsec.fyi

Recently Added Resources

The latest 198 resources added across all topics.

Recently Added

The most recent resources added to appsec.fyi, across all topics. Subscribe to the RSS feed to stay updated.

Date Topic Link Excerpt
2026-04-19SSTIInj3ctlab — SSTI Bug Bounty Labs WriteupInj3ctlab — SSTI Bug Bounty Labs Writeup
2026-04-19SSTIServer-Side Template Injection — Bug Bounty 2k25Server-Side Template Injection — Bug Bounty 2k25
2026-04-19JWTCVE-2025-45768: PyJWT Information Disclosure VulnerabilityCVE-2025-45768: PyJWT Information Disclosure Vulnerability
2026-04-19SecretsCompromised IAM Credentials Power Large AWS Crypto Mining CampaignCompromised IAM Credentials Power Large AWS Crypto Mining Campaign
2026-04-19GraphQLPayloadsAllTheThings — GraphQL InjectionPayloadsAllTheThings — GraphQL Injection
2026-04-19IDORIDOR Vulnerability Exploitation Guide — RedfoxSecIDOR Vulnerability Exploitation Guide — RedfoxSec
2026-04-19SSTIWhat is SSTI in Flask/Jinja2? — PayatuWhat is SSTI in Flask/Jinja2? — Payatu
2026-04-19SSTIPayloadsAllTheThings — SSTI READMEPayloadsAllTheThings — SSTI README
2026-04-19JWTHow JWT Libraries Block Algorithm Confusion: Code Review LessonsHow JWT Libraries Block Algorithm Confusion: Code Review Lessons
2026-04-19DeserializationIBM webMethods Integration CVE-2025-36072: Deserialization RCEIBM webMethods Integration CVE-2025-36072: Deserialization RCE
2026-04-19SecretsPre-Commit Hooks for Secret Detection: Setup in 10 MinutesPre-Commit Hooks for Secret Detection: Setup in 10 Minutes
2026-04-19Supply ChainShai-Hulud: A Persistent Secret Leaking Campaign — GitGuardianShai-Hulud: A Persistent Secret Leaking Campaign — GitGuardian
2026-04-19MobileZero-Day Vulnerabilities in Apple WebKit — CSA SingaporeZero-Day Vulnerabilities in Apple WebKit — CSA Singapore
2026-04-19MobileUpdate Apple Devices: Actively Exploited CVE-2025-14174 & CVE-2025-43529Update Apple Devices: Actively Exploited CVE-2025-14174 & CVE-2025-43529
2026-04-19MobileCVE-2025-14174: Apple WebKit Memory Corruption Zero-DayCVE-2025-14174: Apple WebKit Memory Corruption Zero-Day
2026-04-19API SecurityBOLA API Attack & Prevention — StackHawkBOLA API Attack & Prevention — StackHawk
2026-04-19API SecurityBroken Object-Level Authorization (BOLA): What It Is and How to Prevent ItBroken Object-Level Authorization (BOLA): What It Is and How to Prevent It
2026-04-19AIMCP Tool Poisoning — How It Works & How To Fight ItMCP Tool Poisoning — How It Works & How To Fight It
2026-04-19AIModel Context Protocol Has Prompt Injection Security ProblemsModel Context Protocol Has Prompt Injection Security Problems
2026-04-19ReconThe 2026 State of Attack Surface Management — ProjectDiscoveryThe 2026 State of Attack Surface Management — ProjectDiscovery
2026-04-19ReconThe Ultimate Guide to Attack Surface Management Tools in 2025The Ultimate Guide to Attack Surface Management Tools in 2025
2026-04-19ReconTop 10 Attack Surface Management Tools for 2026 — IntruderTop 10 Attack Surface Management Tools for 2026 — Intruder
2026-04-19Recon12 Attack Surface Management Tools to Know in 202612 Attack Surface Management Tools to Know in 2026
2026-04-19Bug BountyHackerOne Paid $81 Million in Bug Bounties Over the Past YearHackerOne Paid $81 Million in Bug Bounties Over the Past Year
2026-04-19RCECVE-2025-22457: Ivanti Connect Secure VPN Zero-Day RCECVE-2025-22457: Ivanti Connect Secure VPN Zero-Day RCE
2026-04-19RCEAdvisory: Actively Exploited Unauthenticated RCE in Ivanti Connect Secure (CVE-2025-0282)Advisory: Actively Exploited Unauthenticated RCE in Ivanti Connect Secure (CVE-2025-0282)
2026-04-19RCECommand Injection in Jenkins via Git Parameter (CVE-2025-53652)Command Injection in Jenkins via Git Parameter (CVE-2025-53652)
2026-04-19CSRFCVE-2025-9611: Microsoft Playwright MCP Server CSRF FlawCVE-2025-9611: Microsoft Playwright MCP Server CSRF Flaw
2026-04-19CSRFCVE-2025-23797: WP Options Editor CSRF VulnerabilityCVE-2025-23797: WP Options Editor CSRF Vulnerability
2026-04-19CSRFAVideo CSRF — CVE-2025-3100 (Critical)AVideo CSRF — CVE-2025-3100 (Critical)
2026-04-19CSRFAuthlib (Python) CSRF (Cache-Backed OAuth State) — CVE-2025-68158Authlib (Python) CSRF (Cache-Backed OAuth State) — CVE-2025-68158
2026-04-19OSINTOSINT Framework: How to Build a Custom Maltego TransformOSINT Framework: How to Build a Custom Maltego Transform
2026-04-19SSRFCVE-2025-61882 Explained: The Oracle Zero-Day BreachCVE-2025-61882 Explained: The Oracle Zero-Day Breach
2026-04-19SSRFOracle EBS CVE-2025-61882: Pre-auth SSRF Leads to RCEOracle EBS CVE-2025-61882: Pre-auth SSRF Leads to RCE
2026-04-19SSRFOracle EBS Under Fire as Cl0p Exploits CVE-2025-61882Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882
2026-04-19SSRFOracle E-Business Suite Zero-Day Exploited — Google CloudOracle E-Business Suite Zero-Day Exploited — Google Cloud
2026-04-19GraphQLApproaching GraphQL End Points — Bug Bounty NotesApproaching GraphQL End Points — Bug Bounty Notes
2026-04-19GraphQLDoS via Mutation Aliasing in GraphQL — HackerOne DisclosureDoS via Mutation Aliasing in GraphQL — HackerOne Disclosure
2026-04-19IDORBykea: IDOR on In-App Hardcoded Zombie — HackerOneBykea: IDOR on In-App Hardcoded Zombie — HackerOne
2026-04-19IDORIDOR Vulnerability — HackerOne Report 2633771IDOR Vulnerability — HackerOne Report 2633771
2026-04-19IDORTop 235 IDOR Bug Bounty ReportsTop 235 IDOR Bug Bounty Reports
2026-04-19SSTIFind and Exploit Server-Side Template Injection — TCM SecurityFind and Exploit Server-Side Template Injection — TCM Security
2026-04-19JWTJSON Web Token Attacks and Vulnerabilities — AcunetixJSON Web Token Attacks and Vulnerabilities — Acunetix
2026-04-19JWTSecurity of JSON Web Tokens (JWT) — Cyber PolygonSecurity of JSON Web Tokens (JWT) — Cyber Polygon
2026-04-19JWTAnalyzing Broken User Authentication Threats to JWTs — AkamaiAnalyzing Broken User Authentication Threats to JWTs — Akamai
2026-04-19AuthenticationBypassing MFA with OAuth Abuse: Pentesting SSO FlowsBypassing MFA with OAuth Abuse: Pentesting SSO Flows
2026-04-19AuthenticationSSO Protocol Security: Critical Vulnerabilities in SAML, OAuth, OIDC, JWT (2025)SSO Protocol Security: Critical Vulnerabilities in SAML, OAuth, OIDC, JWT (2025)
2026-04-19AuthenticationThe Art of Breaking OAuth: Real-World Exploits and MisusesThe Art of Breaking OAuth: Real-World Exploits and Misuses
2026-04-19AuthenticationOAuth2-Proxy Authentication Bypass (CVE-2025-54576)OAuth2-Proxy Authentication Bypass (CVE-2025-54576)
2026-04-19AuthenticationOAuth SSO WordPress Plugin JWT Bypass (CVE-2025-9485)OAuth SSO WordPress Plugin JWT Bypass (CVE-2025-9485)
2026-04-19DeserializationDeserialization Vulnerability — Exploit-DB PaperDeserialization Vulnerability — Exploit-DB Paper
2026-04-19DeserializationCisco ISE Insecure Java Deserialization — Cisco DocsCisco ISE Insecure Java Deserialization — Cisco Docs
2026-04-19DeserializationInsecure Deserialization Vulnerabilities — AcunetixInsecure Deserialization Vulnerabilities — Acunetix
2026-04-19DeserializationCisco ISE Insecure Java Deserialization (CVE-2025-20124)Cisco ISE Insecure Java Deserialization (CVE-2025-20124)
2026-04-19SecretsUnderstanding Your Organization's Exposure to Secret Leaks — GitHubUnderstanding Your Organization's Exposure to Secret Leaks — GitHub
2026-04-19SecretsExposed Developer Secrets Surge: AI Drives 34% Increase in 2025Exposed Developer Secrets Surge: AI Drives 34% Increase in 2025
2026-04-19SecretsGitHub Found 39M Secret Leaks in 2024 — The GitHub BlogGitHub Found 39M Secret Leaks in 2024 — The GitHub Blog
2026-04-19Supply ChainDefending Against npm Supply Chain Attacks — SplunkDefending Against npm Supply Chain Attacks — Splunk
2026-04-19Supply ChainMultiple Supply Chain Attacks against npm Packages — Red HatMultiple Supply Chain Attacks against npm Packages — Red Hat
2026-04-19Supply ChainShai-Hulud Malware: Second-Wave npm Supply Chain AttackShai-Hulud Malware: Second-Wave npm Supply Chain Attack
2026-04-19Supply ChainCISA: Widespread Supply Chain Compromise Impacting npm EcosystemCISA: Widespread Supply Chain Compromise Impacting npm Ecosystem
2026-04-19MobileTwo Serious Vulnerabilities in Latest Android Security UpdateTwo Serious Vulnerabilities in Latest Android Security Update
2026-04-19MobileLANDFALL: New Commercial-Grade Android Spyware (CVE-2025-21042)LANDFALL: New Commercial-Grade Android Spyware (CVE-2025-21042)
2026-04-19API SecurityOWASP Top 10 API Security Risks and How to Mitigate Them — PyntOWASP Top 10 API Security Risks and How to Mitigate Them — Pynt
2026-04-19API SecurityOWASP Top 10 2025: Latest Changes and EnhancementsOWASP Top 10 2025: Latest Changes and Enhancements
2026-04-19API SecurityOWASP API Security Top 10 Vulnerabilities — 2025OWASP API Security Top 10 Vulnerabilities — 2025
2026-04-19AuthZBroken Access Control: The Quiet Killer in Web ApplicationsBroken Access Control: The Quiet Killer in Web Applications
2026-04-19AuthZOWASP Top 10 2025: IAAA Failures TryHackMe WriteupOWASP Top 10 2025: IAAA Failures TryHackMe Writeup
2026-04-19AuthZBroken Access Control: The Silent Web VulnerabilityBroken Access Control: The Silent Web Vulnerability
2026-04-19AuthZBroken Access Control: The 40% Surge in 2025Broken Access Control: The 40% Surge in 2025
2026-04-19AuthZOWASP Top 10 2025 — A01 Broken Access ControlOWASP Top 10 2025 — A01 Broken Access Control
2026-04-19AIVulnerability of LLMs to Prompt Injection in Medical Advice — JAMAVulnerability of LLMs to Prompt Injection in Medical Advice — JAMA
2026-04-19AIPrompt Injection Attack Against LLM-Integrated Applications — arXivPrompt Injection Attack Against LLM-Integrated Applications — arXiv
2026-04-19AIPrompt Injection Attacks in LLMs and AI Agent Systems: A Comprehensive ReviewPrompt Injection Attacks in LLMs and AI Agent Systems: A Comprehensive Review
2026-04-19FuzzingGenerative Fuzzer-Driven Vulnerability Detection in IoT NetworksGenerative Fuzzer-Driven Vulnerability Detection in IoT Networks
2026-04-19FuzzingAutomating Fuzz Driver Generation for Deep Learning Libraries with LLMsAutomating Fuzz Driver Generation for Deep Learning Libraries with LLMs
2026-04-19FuzzingFuzz to the Future: Uncovering Occluded Future VulnerabilitiesFuzz to the Future: Uncovering Occluded Future Vulnerabilities
2026-04-19FuzzingEdgeFuzz: A Middleware-Based Security Testing ToolEdgeFuzz: A Middleware-Based Security Testing Tool
2026-04-19FuzzingSoftware Fuzzing: The Cornerstone of Automated Vulnerability DiscoverySoftware Fuzzing: The Cornerstone of Automated Vulnerability Discovery
2026-04-19ReconSubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
2026-04-19TalksDEF CON 33 Hacking Conference 2025 — USFDEF CON 33 Hacking Conference 2025 — USF
2026-04-19TalksDEF CON 33 (2025) — Security.WorldDEF CON 33 (2025) — Security.World
2026-04-19TalksWhat to Expect from BSides, Black Hat, and DEF CON 2025What to Expect from BSides, Black Hat, and DEF CON 2025
2026-04-19TalksDEF CON 2025 — Open Source Security FoundationDEF CON 2025 — Open Source Security Foundation
2026-04-19TalksDEFCON Conference — Official YouTubeDEFCON Conference — Official YouTube
2026-04-19Bug Bounty9 Top Bug Bounty Programs Launched in 2025 — CSO Online9 Top Bug Bounty Programs Launched in 2025 — CSO Online
2026-04-19Bug BountyBug-bounty Writeups Repository — fardeen-ahmedBug-bounty Writeups Repository — fardeen-ahmed
2026-04-19Bug BountyGoogle's Bug Bounty Program Hits All-Time High — $17M in 2025Google's Bug Bounty Program Hits All-Time High — $17M in 2025
2026-04-19Bug BountyTop Bugs That Actually Paid Bounties in 2025Top Bugs That Actually Paid Bounties in 2025
2026-04-19RCE0xMarcio/cve: Latest CVEs with PoC Exploits0xMarcio/cve: Latest CVEs with PoC Exploits
2026-04-19RCEMicrosoft WSUS RCE (CVE-2025-59287) Actively ExploitedMicrosoft WSUS RCE (CVE-2025-59287) Actively Exploited
2026-04-19CSRFWeb Security Academy: CSRF SameSite Lax Bypass via Method OverrideWeb Security Academy: CSRF SameSite Lax Bypass via Method Override
2026-04-19Burp SuitePentest-Mapper: Burp Extension for Pentesters & Bug BountyPentest-Mapper: Burp Extension for Pentesters & Bug Bounty
2026-04-19Burp SuiteBurp Suite Extension: Copy For — Black Hills InfoSecBurp Suite Extension: Copy For — Black Hills InfoSec
2026-04-19Burp SuiteBurp AI — PortSwiggerBurp AI — PortSwigger
2026-04-19Burp SuitePentest Mapper: Burp Extension for Application PentestingPentest Mapper: Burp Extension for Application Pentesting
2026-04-19Burp SuitePentest Mapper — PortSwigger BApp StorePentest Mapper — PortSwigger BApp Store
2026-04-19PythonPyPI Supply Chain Attack: Colorama and Colorizr Name ConfusionPyPI Supply Chain Attack: Colorama and Colorizr Name Confusion
2026-04-19PythonCompromised LiteLLM PyPI Package Delivers Credential StealerCompromised LiteLLM PyPI Package Delivers Credential Stealer
2026-04-19PythonLiteLLM PyPI Package Compromised in TeamPCP Supply Chain AttackLiteLLM PyPI Package Compromised in TeamPCP Supply Chain Attack
2026-04-19PythonMalicious PyPI Package — LiteLLM Supply Chain CompromiseMalicious PyPI Package — LiteLLM Supply Chain Compromise
2026-04-19PythonThe PyPI Supply Chain Attacks of 2025The PyPI Supply Chain Attacks of 2025
2026-04-19OSINTTop 10 OSINT Tools, Products & Solutions — SocialLinksTop 10 OSINT Tools, Products & Solutions — SocialLinks
2026-04-19OSINTHow to Use OSINT for Investigations — Moody'sHow to Use OSINT for Investigations — Moody's
2026-04-19OSINTOSINT Industries — Online Investigations PlatformOSINT Industries — Online Investigations Platform
2026-04-19OSINTOSINT Tools Security Analysts Should Know for 2025OSINT Tools Security Analysts Should Know for 2025
2026-04-19SQLiUnauthenticated SQL Injection in GUI — Fortinet PSIRTUnauthenticated SQL Injection in GUI — Fortinet PSIRT
2026-04-19SQLiCVE-2025-1094 WebSocket and SQL Injection Exploit ScriptCVE-2025-1094 WebSocket and SQL Injection Exploit Script
2026-04-19SQLiCVE-2025-1094: PostgreSQL psql SQL Injection (Fixed) — Rapid7CVE-2025-1094: PostgreSQL psql SQL Injection (Fixed) — Rapid7
2026-04-19SQLiPostgreSQL CVE-2025-1094: Quoting APIs SQL InjectionPostgreSQL CVE-2025-1094: Quoting APIs SQL Injection
2026-04-19SQLiCVE-2025-26794: Blind SQL Injection in Exim 4.98 — WriteupCVE-2025-26794: Blind SQL Injection in Exim 4.98 — Writeup
2026-04-19SSRFServer-Side Request Forgery (SSRF) — Practical GuideServer-Side Request Forgery (SSRF) — Practical Guide
2026-04-19XXEIBM Business Automation Workflow XXE (CVE-2025-13096)IBM Business Automation Workflow XXE (CVE-2025-13096)
2026-04-19XXEXXE Vulnerability Guide 2025: How XML Attacks Still ThreatenXXE Vulnerability Guide 2025: How XML Attacks Still Threaten
2026-04-19XXEXXE Injection in langchain-community (CVE-2025-6984)XXE Injection in langchain-community (CVE-2025-6984)
2026-04-19XXECritical Apache Tika CVE-2025-66516: XXE VulnerabilityCritical Apache Tika CVE-2025-66516: XXE Vulnerability
2026-04-19XXEXXE in GeoServer WFS Service (CVE-2025-30220)XXE in GeoServer WFS Service (CVE-2025-30220)
2026-04-19GraphQLGraphQL API Vulnerabilities Learning Path — PortSwiggerGraphQL API Vulnerabilities Learning Path — PortSwigger
2026-04-19GraphQLGraphQL Introspection Security: Lessons from the Parse Server VulnerabilityGraphQL Introspection Security: Lessons from the Parse Server Vulnerability
2026-04-19XSSBypassing Signature-Based XSS Filters: Modifying HTMLBypassing Signature-Based XSS Filters: Modifying HTML
2026-04-19XSSXSS Bypass Techniques — Cyber GitaXSS Bypass Techniques — Cyber Gita
2026-04-19XSSAdvanced XSS Filter Bypass Methods Using Payload SplittingAdvanced XSS Filter Bypass Methods Using Payload Splitting
2026-04-19XSSXSS Payload Bypass Technique: A Practical GuideXSS Payload Bypass Technique: A Practical Guide
2026-04-19XSSIntigriti July 2025 XSS Challenge — Jorian WoltjerIntigriti July 2025 XSS Challenge — Jorian Woltjer
2026-04-18SSRFFunny how the more you fuck around the more you find out. Do you see an id? mess around with it can't find the private ip where the http client is running? send a nonexistent host to leak it an enum from there #bugbountytips #SSRF pic.x.com/t0HhOXupGQFunny how the more you fuck around, the more you find out. Do you see an id? mess around with it, can't find the private ip where the http client is running? send a nonexistent host to leak it an enum...
2026-04-17XSSMultiple Cross-Site Scripting (XSS) Vulnerabilities in MailcowMultiple Cross-Site Scripting (XSS) Vulnerabilities in Mailcow https://ift.tt/ufEgtyJ
2026-04-17SSTIActive Exploitation of Confluence CVE-2022-26134 (Rapid7)Active Exploitation of Confluence CVE-2022-26134 (Rapid7)
2026-04-17SSTIAtlassian Confluence Widget Connector Macro SSTI (ExploitDB)Atlassian Confluence Widget Connector Macro SSTI (ExploitDB)
2026-04-17SSTISSTItoXSS: Exploiting SSTI to bypass WAF/XSS FilterSSTItoXSS: Exploiting SSTI to bypass WAF/XSS Filter
2026-04-17SSTISSTI (The Hacker Recipes)SSTI (The Hacker Recipes)
2026-04-17SSTIExploiting CVE-2021-25770: SSTI in YouTrack (Synacktiv)Exploiting CVE-2021-25770: SSTI in YouTrack (Synacktiv)
2026-04-17SSTISSTI in Freemarker (Akto)SSTI in Freemarker (Akto)
2026-04-17SSTIRuby ERB Template Injection (TrustedSec)Ruby ERB Template Injection (TrustedSec)
2026-04-17SSTIPayloadsAllTheThings: SSTI Ruby payloadsPayloadsAllTheThings: SSTI Ruby payloads
2026-04-17SSTICode Execution via SSTI Ruby ERB (Invicti)Code Execution via SSTI Ruby ERB (Invicti)
2026-04-17SSTIruby-ssti: example Ruby ERB app vulnerable to SSTIruby-ssti: example Ruby ERB app vulnerable to SSTI
2026-04-17JWTJWT Token Lifecycle: Expiration, Refresh, and RevocationJWT Token Lifecycle: Expiration, Refresh, and Revocation
2026-04-17JWTpython-jwt token forgery CVE-2022-39227python-jwt token forgery CVE-2022-39227
2026-04-17JWTCVE-2024-53861: PyJWT Issuer Field Partial MatchCVE-2024-53861: PyJWT Issuer Field Partial Match
2026-04-17JWTPython-JOSE Security Risk: CVE-2024-33663 ExplainedPython-JOSE Security Risk: CVE-2024-33663 Explained
2026-04-17JWTJWT Bomb in Python-JOSE CVE-2024-33664JWT Bomb in Python-JOSE CVE-2024-33664
2026-04-17JWTJWT Pentest Book (six2dez)JWT Pentest Book (six2dez)
2026-04-17JWTJWT Pentest Checklist (Cyber Frogy)JWT Pentest Checklist (Cyber Frogy)
2026-04-17JWTJWT Pentest Checklist v1.0 (Chintan Gurjar)JWT Pentest Checklist v1.0 (Chintan Gurjar)
2026-04-17JWTHackerOne #1210502: Jitsi Authentication Bypass (JWT)HackerOne #1210502: Jitsi Authentication Bypass (JWT)
2026-04-17JWTHackerOne #2472798: Newspack Extended Access JWT bypassHackerOne #2472798: Newspack Extended Access JWT bypass
2026-04-17ReconBug Bounty Recon: Perform Faster Port Scan (Rootsploit)Bug Bounty Recon: Perform Faster Port Scan (Rootsploit)
2026-04-17ReconNaabu Zero to Hero Guide (Cyber Aryan)Naabu Zero to Hero Guide (Cyber Aryan)
2026-04-17ReconMastering Network Scanning: Nmap and Masscan GuideMastering Network Scanning: Nmap and Masscan Guide
2026-04-17ReconNaabu Cheat Sheet: Commands & Examples (HighOn.Coffee)Naabu Cheat Sheet: Commands & Examples (HighOn.Coffee)
2026-04-17Reconnaabu: Fast Go port scanner (ProjectDiscovery)naabu: Fast Go port scanner (ProjectDiscovery)
2026-04-17ReconRecon series #4: Port scanning methods (YesWeHack)Recon series #4: Port scanning methods (YesWeHack)
2026-04-17ReconbountyRecon: Bash automation for bug bounty reconbountyRecon: Bash automation for bug bounty recon
2026-04-17ReconJSFScan.sh: JavaScript recon automation (KathanP19)JSFScan.sh: JavaScript recon automation (KathanP19)
2026-04-17ReconReconky: Content discovery bash scriptReconky: Content discovery bash script
2026-04-17ReconBug-Bounty-Automation: Bash recon (Retr0-45809)Bug-Bounty-Automation: Bash recon (Retr0-45809)
2026-04-17ReconRecon-Script: automation with Nuclei (s1d6point7bugcrowd)Recon-Script: automation with Nuclei (s1d6point7bugcrowd)
2026-04-17ReconBug-Bounty-Recon-Automation shell script (Amangupta1234)Bug-Bounty-Recon-Automation shell script (Amangupta1234)
2026-04-17DeserializationCVE-2023-34040: Spring-Kafka Java DeserializationCVE-2023-34040: Spring-Kafka Java Deserialization
2026-04-17DeserializationApache Struts vulnerability leads to RCEApache Struts vulnerability leads to RCE
2026-04-17DeserializationJackson deserialization vulnerability exploit (3 gadgets, GitHub)Jackson deserialization vulnerability exploit (3 gadgets, GitHub)
2026-04-17DeserializationApache Struts2 Code Execution Exploit (Infopercept)Apache Struts2 Code Execution Exploit (Infopercept)
2026-04-17DeserializationSpring-web Java Deserialization: CVE-2016-1000027 (Contrast)Spring-web Java Deserialization: CVE-2016-1000027 (Contrast)
2026-04-17DeserializationExploiting Apache Struts: Writing Better Detections (Gigamon)Exploiting Apache Struts: Writing Better Detections (Gigamon)
2026-04-17DeserializationFriday the 13th JSON Attacks (Black Hat)Friday the 13th JSON Attacks (Black Hat)
2026-04-17DeserializationPayloadsAllTheThings: Insecure Deserialization DotNETPayloadsAllTheThings: Insecure Deserialization DotNET
2026-04-17DeserializationBasic .Net deserialization ObjectDataProvider gadget (HackTricks)Basic .Net deserialization ObjectDataProvider gadget (HackTricks)
2026-04-17DeserializationPython-Pickle-RCE-Exploit + vulnerable Flask App (GitHub)Python-Pickle-RCE-Exploit + vulnerable Flask App (GitHub)
2026-04-17DeserializationSOUR PICKLE: Insecure Deserialization with Python PickleSOUR PICKLE: Insecure Deserialization with Python Pickle
2026-04-17DeserializationPayloadsAllTheThings: Insecure Deserialization PythonPayloadsAllTheThings: Insecure Deserialization Python
2026-04-17DeserializationPickle Code Execution Exploitation (Dhound)Pickle Code Execution Exploitation (Dhound)
2026-04-17DeserializationPython-socketio: Pickle deserialization RCE advisoryPython-socketio: Pickle deserialization RCE advisory
2026-04-17DeserializationExploiting deserialization in recent Java versions (OWASP Stuttgart)Exploiting deserialization in recent Java versions (OWASP Stuttgart)
2026-04-17DeserializationAutomated Discovery of Deserialization Gadget Chains (Black Hat)Automated Discovery of Deserialization Gadget Chains (Black Hat)
2026-04-17DeserializationPrevent insecure deserialization attacks (Veracode)Prevent insecure deserialization attacks (Veracode)
2026-04-17DeserializationUnderstanding Insecure Deserialization: Risks and MitigationsUnderstanding Insecure Deserialization: Risks and Mitigations
2026-04-17DeserializationBug Bounty Hunting: Insecure DeserializationBug Bounty Hunting: Insecure Deserialization
2026-04-17DeserializationInsecure Deserialization - Attack Technique (vuln.today)Insecure Deserialization - Attack Technique (vuln.today)
2026-04-17Supply ChainClosing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)Closing the Chain: How to reduce SolarWinds/Log4j/XZ risk (arXiv)
2026-04-17Supply ChainSolarWinds Supply Chain Attack (Fortinet)SolarWinds Supply Chain Attack (Fortinet)
2026-04-17Supply Chainossf/malicious-packages: Reports of malicious open source packagesossf/malicious-packages: Reports of malicious open source packages
2026-04-17Supply Chain5 Examples of Dependency Confusion Attacks (Spectral)5 Examples of Dependency Confusion Attacks (Spectral)
2026-04-17Supply ChainWhat Is a Dependency Confusion Attack? (Aqua Security)What Is a Dependency Confusion Attack? (Aqua Security)
2026-04-17Supply ChainDefender's Perspective: Dep Confusion and Typosquatting (SLSA)Defender's Perspective: Dep Confusion and Typosquatting (SLSA)
2026-04-17Supply ChainSBOMs in 2026: Some Love, Some Hate, Much AmbivalenceSBOMs in 2026: Some Love, Some Hate, Much Ambivalence
2026-04-17Supply ChainSoftware Bill of Materials (SBOM) (CISA)Software Bill of Materials (SBOM) (CISA)
2026-04-17Supply ChainAbout SLSA (spec v1.2)About SLSA (spec v1.2)
2026-04-17Supply ChainWhat is a Software Bill of Materials (SBOM)? (Snyk)What is a Software Bill of Materials (SBOM)? (Snyk)
2026-04-17Supply ChainSBOM Literature Review (arXiv)SBOM Literature Review (arXiv)
2026-04-17Supply ChainSBOM + SLSA: Accelerating SBOM success with SLSASBOM + SLSA: Accelerating SBOM success with SLSA
2026-04-17Supply ChainSLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)SLSA - Comprehensive Approach to Supply Chain Security (SBOM Observer)
2026-04-17Supply ChainUnderstanding SBOM: Transparency & Security in Supply Chains (Cycode)Understanding SBOM: Transparency & Security in Supply Chains (Cycode)
2026-04-17Supply ChainWhat We Know About the NPM Supply Chain Attack (Trend Micro)What We Know About the NPM Supply Chain Attack (Trend Micro)
2026-04-17Supply ChainNew Supply Chain Malware Operation Hits npm and PyPINew Supply Chain Malware Operation Hits npm and PyPI
2026-04-17Supply Chainnpm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)npm Supply Chain Attack: Debug, Chalk + 16 Packages Compromise (Upwind)
2026-04-17Supply ChainMalicious PyPI, npm, Ruby Packages Exposed (The Hacker News)Malicious PyPI, npm, Ruby Packages Exposed (The Hacker News)
2026-04-17Supply ChainA Closer Look at Software Supply Chain Attacks 2025 (Xygeni)A Closer Look at Software Supply Chain Attacks 2025 (Xygeni)
2026-04-17IDORFrom Reset to Takeover: IDOR in Password Recovery SystemsFrom Reset to Takeover: IDOR in Password Recovery Systems