brutelogic.com.br
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2025-08-14.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2025-08-14 2025 | http://brutelogic.com.br/blog/xss-and-rce/XSS | The content discusses the concepts of Cross-Site Scripting (XSS) and Remote Code Execution (RCE) vulnerabilities. It explains how XSS can be used to inject malicious scripts into web applications, potentially leading to RCE attacks where an attacker can execute arbitrary code on the server. The article likely provides insights into the impact of these vulnerabilities, how they can be exploited, and ways to prevent them. For detailed information, please refer to the original content at the provided link. |
| 2025-08-14 2025 | File Upload XSS - Brute XSSXSS | The content is very brief and only mentions "File Upload XSS - Brute XSS." This likely refers to a type of cross-site scripting (XSS) attack that involves exploiting vulnerabilities in file upload functionality to inject malicious scripts. The term "Brute XSS" may suggest a method of executing XSS attacks in a forceful or aggressive manner. Overall, the content seems to highlight the potential risks associated with file upload features on websites and the importance of protecting against XSS attacks. |
| 2024-11-02 2024 | Brute XSS 2024XSS | A 10-page collection of dozens of the best vectors and payloads for Cross-Site Scripting (XSS) with filter bypass techniques. |
| 2019-08-30 2019 | File Upload XSS - Brute XSSXSS | The content discusses exploiting file uploads to execute cross-site scripting (XSS) attacks, especially in user-restricted areas with profile picture uploads. It highlights the potential for finding developer errors and mentions self XSS as a vulnerability. The post emphasizes the various entry points for launching an attack through file upload XSS. |
| 2018-06-04 2018 | XSS and RCE - Brute XSSXSS | RCE (Remote Code Execution) is a severe vulnerability sought after by attackers to compromise systems. XSS, often underestimated, can be a stepping stone towards achieving RCE. Both vulnerabilities can lead to server, client, and network compromise. Understanding the relationship between XSS and RCE is crucial for effective security measures. |