From 38dc0d35579e16c6a73b014af97e50e414e72da1 Mon Sep 17 00:00:00 2001 From: xanhacks Date: Wed, 1 May 2024 14:40:45 +0200 Subject: [PATCH] add parsing docs --- content/docs/getting-started/vulnerability-reports.md | 7 ++++++- content/docs/others/parsing.md | 4 ++++ hugo_stats.json | 3 +++ 3 files changed, 13 insertions(+), 1 deletion(-) diff --git a/content/docs/getting-started/vulnerability-reports.md b/content/docs/getting-started/vulnerability-reports.md index 58a0e68..1e46751 100644 --- a/content/docs/getting-started/vulnerability-reports.md +++ b/content/docs/getting-started/vulnerability-reports.md @@ -44,9 +44,10 @@ toc: true - [Article - XSS with bypass on ProtonMail webclient](https://www.sonarsource.com/blog/code-vulnerabilities-leak-emails-in-proton-mail/) - [Article - Fetch Diversion](https://acut3.net/posts/2023-01-03-fetch-diversion/) -## Server-Side +## Parser - [Article - Exploiting HTTP Parsers Inconsistencies](https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies) +- [Exploring IPv6 Zone Identifier](https://blog.slonser.info/posts/ipv6-zones/) ## PHP @@ -94,6 +95,10 @@ toc: true - [Shockwave Identifies Web Cache Deception and Account Takeover Vulnerability affecting OpenAI's ChatGPT](https://www.shockwave.cloud/blog/shockwave-works-with-openai-to-fix-critical-chatgpt-vulnerability) - [ChatGPT Account Takeover - Wildcard Web Cache Deception](https://nokline.github.io/bugbounty/2024/02/04/ChatGPT-ATO.html) +## Cryptography + +- [Unsecure time-based secret and Sandwich Attack](https://www.aeth.cc/public/Article-Reset-Tolkien/secret-time-based-article-en.html) + ## Others - [Article - Detecting uBlock on Chrome Browser](https://blog.ankursundara.com/checking-enumerating-a-users-browser-extensions/) diff --git a/content/docs/others/parsing.md b/content/docs/others/parsing.md index aeacf4c..5b60270 100644 --- a/content/docs/others/parsing.md +++ b/content/docs/others/parsing.md @@ -17,6 +17,10 @@ toc: true Parsing refers to the process of analyzing and converting input data into a more usable format. While essential for data processing, parsing can introduce security mistakes. +## HTTP + +- [Exploiting HTTP Parsers Inconsistencies](https://rafa.hashnode.dev/exploiting-http-parsers-inconsistencies) + ## IPv6 - [Exploring IPv6 Zone Identifier](https://blog.slonser.info/posts/ipv6-zones/) \ No newline at end of file diff --git a/hugo_stats.json b/hugo_stats.json index de0261b..17cd6d5 100644 --- a/hugo_stats.json +++ b/hugo_stats.json @@ -329,6 +329,7 @@ "cross-origin-read-blocking-corb", "cross-origin-resource-policy-corp", "cross-origin-resource-sharing-cors", + "cryptography", "csp", "csp-bypass", "cve-2021-41773---path-traversal--potential-rce", @@ -377,6 +378,7 @@ "hostonly", "how-corb-works", "html-parser-fuzzing", + "http", "httponly", "in-scope", "infinite-levels-deep", @@ -423,6 +425,7 @@ "other-attributes", "others", "out-of-scope", + "parser", "parsing", "passing-request-headers", "path-traversal",