penligent.ai
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-22 2026 | CVE 2026: When Identity Breaks and Legacy Code Bites BackAuthZ | CVE 2026: When Identity Breaks and Legacy Code Bites Back |
| 2026-04-22 2026 | IDOR in the Wild: What CVE-2025-13526 Teaches Security EngineersIDOR | IDOR in the Wild: What CVE-2025-13526 Teaches Security Engineers |
| 2026-04-17 2026 | CVE-2026-29000: pac4j-jwt Authentication BypassJWT | CVE-2026-29000: pac4j-jwt Authentication Bypass |
| 2026-04-10 2026 | Private IP Addresses Deep Dive: Security Risks, SSRF, and ExploitationSSRF | Private IP Addresses Deep Dive: Security Risks, SSRF, and Exploitation |
| 2026-04-10 2026 | OpenClaw: Authorization Bypass and Privilege EscalationAuthZ | OpenClaw: Authorization Bypass and Privilege Escalation |
| 2026-04-10 2026 | Bug Bounty Hunter Software in 2026: What Belongs in Your StackBug Bounty | Bug Bounty Hunter Software in 2026: What Belongs in Your Stack |
| 2026-04-10 2026 | Burp AI in 2026: Real Workflow ChangesBurp | Burp AI in 2026: Real Workflow Changes |
| 2026-04-10 2026 | Agentic AI Security in Production: MCP, Memory Poisoning, Tool MisuseAI | Agentic AI Security in Production: MCP, Memory Poisoning, Tool Misuse |