Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
DOS via cache poisoning | |||
A successful prototype pollution chained to a DOM XSS | |||
An IDOR vulnerability often hides many others |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
DOS via cache poisoning | |||
A successful prototype pollution chained to a DOM XSS | |||
An IDOR vulnerability often hides many others |