IW Team

IW Team

👩‍💻IW Weekly #53: Privilege Escalation, Authentication Bypass Vulnerability, CRLF, JSON Based SQL, Local File Inclusion, Broken Authentication Vulnerability, and many more…

In this week’s newsletter read about the wide exploration of authentication bypass vulnerability, leading to a critical security issue by ASWIN K V. Welcome to the #IWWeekly53 - the Monday newsletter that brings the best in Infosec straight to your inbox. To help you out, we have 5 Articles,
3 min read

👩‍💻IW Weekly #52: Filter chains, Prototype Pollution in Node, Privilege Escalation, Vulnerabilities in ChatGPT, Copy&Paste XSS, Shodan Dorks and many more…

The possibilities allowed by filter chains will never stop amazing us. In this blog Rémi Matasse showcases how it’s used to read files from an error-based Oracle. Welcome to the #IWWeekly52 - the Monday newsletter that brings the best in Infosec straight to your inbox. To help you out,
3 min read

👩‍💻IW Weekly #51: Server-Side prototype pollution, Pentest mapper, SSRF in Meta, Hacking CI/CD pipelines, AWSScrape, Hacking Android, SQL Injections and much more…

@PortSwigger released a tool for finding server-side prototype pollution bugs and here’s all you need to know about it. Welcome to the #IWWeekly51 - the Monday newsletter that brings the best in Infosec straight to your inbox. To help you out, we have 5 Articles, 4 Threads, 3 Videos,
3 min read

👩‍💻IW Weekly #50: Authentication and Authorization Vulnerabilities in Datahub, Leaky GraphQL, Account Takeover via Preset Passwords, Insecure Deserialization, $10000 Bounty and much more…

@GHSecurityLab discovered authentication and authorization vulnerabilities in DataHub, an open-source metadata platform, potentially allowing unauthorized access to sensitive data stored on the platform. Welcome to the #IWWeekly50 - the Monday newsletter that brings the best in Infosec straight to your inbox. Thank you for making it so far with us!
3 min read

👩‍💻IW Weekly #47: SSRF to Infrastructure Access, HubSpot Full Account Takeover, RCE to S3 Leak, SQL Injections, Stored XSS, Broken Access Control and many more…

Breaking Boundaries: @basu_banakar uncovers SSRF vulnerability providing access to complete infrastructure and web services. Welcome to the #IWWeekly47 - the Monday newsletter that brings the best in Infosec straight to your inbox. To help you out, we have 5 Articles, 4 Threads, 3 Videos, 2 GitHub Repos and Tools,
3 min read

Subscribe to The Infosec Newsletter

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
[email protected]
Subscribe