Search Go hack yourself with Detectify
×

Vulnerabilities 101

Build upon your application security and web vulnerabilities knowledge with our vulnerabilities 101 articles.

firefox Karim Rahal web browser security

Karim Rahal: Security Features of Firefox

0-day Detectify Crowdsource zero-day

How Detectify handles Zero-Day submissions 

Alyssa Herrera Detectify Crowdsource File Disclosure pulse secure SSL VPN

How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN

cloudflare Detectify Crowdsource Gwendal Le Coguic WAF

Bypassing Cloudflare WAF with the origin server IP address

Detectify Crowdsource Paul Dannewitz Plugins WordPress

Improving WordPress plugin security from both attack and defense sides

Detectify Crowdsource IDOR Lerhan URL shorteners

Lerhan: Bypassing IDOR protection with URL shorteners

Stay up-to-date with security insights from our security experts and ethical hackers Subscribe to the Detectify Monthly Round-up newsletter
crowdsource Meet the hacker securinti

Meet the Hacker: Inti De Ceukelaire – “While everyone is looking for XSS I am just reading the docs.”

DOM XSS Persistent XSS Reflected XSS XSS

What are the different types of XSS?

crowdsource Eray Mitrani ethical hacker JIRA

Eray Mitrani: Stumbling upon a new way to exploit authorization bypass in Jira

Cloud security Common vulnerability OWASP Top 10 Server side request forgery SSRF

What is server side request forgery (SSRF)?