Hacking News

Úvod  Android (22)  Komunikace(28)  Databáze(39)  Hardware(11)  Infrastruktura(7)  Mobil(18)  LAN(26)   Social site (6)  Software(3)  Virus(66)  Web(724)  VoIP (5)  All

Webové techniky hackerů (724)

 

Název

Popis

Webové aplikace (8)

Jaké jsou techniky proti webovým aplikacím.

Webové prohlížeče (2)

Jaké jsou techniky na webové prohlížeče.

Webové stránky (9)

Jaké jsou techniky proti webovým stránkám.

Webová bezpečnost ()

Jaké jsou techniky proti webovému zabezpečení.

Název
1 (DOMinator) Finding DOMXSS with dynamic taint propagation
2 (Non-Persistent) Untraceable XSS Attacks
3 .Net Cross Site Scripting – Request Validation Bypassing
4 “ASPXErrorPath in URL” Technique in Scanning a .Net Web Application
5 0DAY: QuickTime pwns Firefox
6 10. Using Cookies For Selective DoS and State Detection
7 16. Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution
8 18. Popup & Focus URL Hijacking
9 24. The curse of inverse strokejacking
10 26. Fooling B64_Encode(Payload) on WAFs and filters
11 2CAPTCHA Hax With TesserCap
12 36. Web pages Detecting Virtualized Browsers and other tricks
13 41. Breaking into a WPA network with a webpage
14 45. Stroke triggered XSS and StrokeJacking
15 62. Poisoning proxy caches using Java/Flash/Web Sockets
16 63. How to Conceal XSS Injection in HTML5
17 64. Expanding the Attack Surface
18 65. Chronofeit Phishing
19 66. Non-Obvious (Crypto) Bugs by Example
20 67. SQLi filter evasion cheat sheet (MySQL)
21 8. XSHM Mark 2
22 A brief description of how to become a CA
23 A different Opera
24 A Different Opera 
25 A more plausible E4X attack
26 A story that diggs itself
27 A Twitter DomXss, a wrong fix and something more
28 Aaron Patterson – Serialized YAML Remote Code Execution
29 ABC News (AU) XSS linking the reporter to Al Qaeda
30 About CSS Attacks
31 About CSS Attacks
32 Abusing CDNs with SSRF Flash and DNS
33 Abusing Flash-Proxies for client-side cross-domain HTTP requests
34 Abusing HTML 5 Structured Client-side Storage 
35 Abusing HTTP Status Codes to Expose Private Information
36 Abusing PHP Sockets
37 Abusing PHP Sockets (1, 2)
38 Abusing XLST for Practical Attacks
39 Abusing XSLT for Practical Attacks
40 Account Hijackings Force LiveJournal Changes
41 Active Man in the Middle Attacks
42 Active Man in the Middle Attacks
43 ActiveX Repurposing 
44 ActiveX Repurposing, (1, 2)
45 Additional Image Bypass on Windows
46 Adultspace XSS Worm
47 Advanced Exploitation of Mozilla Firefox Use-After-Free Vulnerability (Pwn2Own 2014) CVE-2014-1512
48 Advanced SQL injection to operating system full control
49 Advanced SQL injection to operating system full control(whitepaper)
50 Advanced Web Attack Techniques using GMail
51 Advanced Web Attack Techniques using GMail 
52 AIR Flash RCE from PWN2OWN
53 All Your Google Docs are Belong To US…
54 Angelo Prado, Neal Harris, Yoel Gluck – BREACH
55 Anonymizing RFI Attacks Through Google
56 Anti-DNS Pinning ( DNS Rebinding )
57 Anti-DNS Pinning ( DNS Rebinding ) : Online Demonstration 
58 Anti-DNS Pinning ( DNS Rebinding ) + Socket in FLASH
59 Anti-DNS Pinning and Circumventing Anti-Anti DNS pinning
60 Apache Struts ClassLoader Manipulation Remote Code Execution 
61 Apache Struts ClassLoader Manipulation Remote Code Execution and Blog Post
62 Apple's Safari 4 also fixes cross-domain XML theft
63 Apple's Safari 4 fixes local file theft attack
64 Arbitrary TCP over uploaded pages
65 Ashar Javad Attack against Facebook’s password reset process.
66 ASP.NET 'Padding Oracle' Crypto Attack
67 AT&T Hack Highlights Web Site Vulnerabilities 
68 Attack - PDF Silent HTTP Form Repurposing Attacks
69 Attack Surface for Project Spartan’s EdgeHTML Rendering Engine
70 Attacking CAPTCHAs for Fun and Profit
71 Attacking HTTPS with Cache Injection
72 Attacking OData: HTTP Verb Tunneling, Navigation Properties for Additional Data Access, System Query Options ($select)
73 Auto-Complete Hack by Hiding Filled in Input Fields with CSS
74 Autocomplete..again?!
75 ava DSN Rebinding + Java Same IP Policy = The Internet Mayhem
76 Backdooring MP3 Files
77 Backdooring PDF Files
78 Backdooring QuickTime Movies
79 BEAST
80 Belkin Buffer Overflow via Web
81 BK for Mayor of Oak Tree View
82 Blended Threats and JavaScript
83 Blind SQL Injection: Inference thourgh Underflow exception
84 Blind SQL Injection: Inference thourgh Underflow exception
85 Blind web server fingerprinting
86 Bonus Safari XXE (only affecting Safari 4 Beta)
87 Breaking Google Gears' Cross-Origin Communication Model 
88 Breaking HTTPS with BGP Hijacking
89 Breaking into a WPA network with a webpage
90 Browser Event Hijacking
91 Browser Port Scanning without JavaScript
92 Browser scheme/slash quirks
93 Browsers Anti-XSS methods in ASP (classic) have been defeated!
94 Browser's Ghost Busters
95 Bruteforce of PHPSESSID
96 Bruteforcing HTTP Auth in Firefox with JavaScript
97 Bruteforcing/Abusing search functions with no-rate checks to collect data
98 Bugs in the Browser: Firefox’s DATA URL Scheme Vulnerability
99 Building Subversive File Sharing With Client Side Applications
100 Bursting Performances in Blind SQL Injection - Take 2 (Bandwidth)
101 Bypass port blocking in Firefox, Opera and Konqueror.
102 Bypass Surgery
103 Bypassing CAPTCHAs by Impersonating CAPTCHA Providers (1,2)
104 Bypassing CSP for fun, no profit
105 Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution
106 Bypassing Filters With Encoding
107 Bypassing Flash’s local-with-filesystem Sandbox
108 Bypassing Flash’s local-with-filesystem Sandbox
109 Bypassing HTTP Basic Authenitcation in PHP Applications (** potential rediscovery of: HTExploit – Bypassing .htaccess restrictions **)
110 Bypassing Chrome’s Anti-XSS filter
111 Bypassing Mozilla Port Blocking
112 Bypassing NoCAPTHCA
113 Bypassing of web filters by using ASCII 
114 Bypassing OWASP ESAPI XSS Protection inside Javascript
115 Bypassing URL Authentication and Authorization with HTTP Verb Tampering
116 Canadian Beacon
117 CAPTCHA Hax With TesserCap
118 CAPTCHA Re-Riding Attack
119 Carlos Munoz – Bypassing Internet Explorer’s Anti-XSS Filter
120 Circumventing DNS Pinning for XSS
121 Click here to vote for your favorite web hacks of the year!
122 Clickjacking & OAuth
123 Clickjacking / Videojacking 
124 Clickjacking Rootkits for Android (2)
125 Client-side SQL Injection Attacks
126 Close encounters of the third kind (client-side JavaScript vulnerabilities)
127 Close encounters of the third kind (client-side JavaScript vulnerabilities)
128 CNNINC SSL MitM
129 Code Execution Through Filenames in Uploads
130 Code Execution via XSS
131 Code Execution via XSS (1)
132 Cody Collier – Exposing Verizon Wireless SMS History
133 Collecting Lots of Free 'Micro-Deposits'
134 Common localhost dns misconfiguration can lead to "same site" scripting
135 Compromising an unreachable Solr Serve
136 Content Smuggling
137 Content-Disposition Hacking
138 Converting unimplementable Cookie-based XSS to a persistent attack
139 Cookie Eviction
140 Cookie Path Traversal
141 Cookiejacking
142 Covert Redirect Vulnerability Related to OAuth 2.0 and OpenID
143 Covert Timing Channels based on HTTP Cache Headers
144 Cracking hashes in the JavaScript cloud with Ravan
145 Cracking Ruby on Rails Sessions
146 Creating a rogue CA certificate
147 CRIME
148 Cross Context Scripting from within the Browser
149 Cross Domain Basic Auth Phishing Tactics
150 Cross domain content extraction with fake captcha
151 Cross Domain Leakage With Image Size
152 Cross Environment Hopping
153 Cross Site URL Hijacking by using Error Object in Mozilla Firefox
154 Cross-Browser Proxy Unmasking
155 Cross-domain leaks of site logins via Authenticated CSS 
156 Cross-domain search timing
157 Cross-protocol XSS with non-standard service ports
158 Cross-protocol XSS with non-standard service ports
159 Cross-site File Upload Attacks
160 Cross-Site Identification (XSid)
161 Cross-Site Port Attacks
162 Cross-Site Printing (Printer Spamming)
163 Cross-subdomain Cookie Attacks
164 Crowd-sourcing mischief on Google Maps leads customers astray
165 Cryptophp Backdoor
166 CSRF And Ignoring Basic/Digest Auth
167 CSRF on Novell GroupWise WebAccess
168 CSRF token disclosure via iFRAME and CAPTCHA trickery 
169 CSRF with JSON – leveraging XHR and CORS
170 CSRF with MS Word
171 CSRF: Flash + 307 redirect = Game Over
172 CSRFing the uTorrent plugin
173 CSS :visited may be a bit overrated
174 CSS History Hack In Firefox Without JavaScript for Intranet Portscanning
175 CSS history hacking with evil marketing
176 CSS History Stealing Acts As Cookie
177 CSS-Only Clickjacking
178 CTA: The weaknesses in client side xss filtering targeting Chrome’s XSS Auditor
179 CUPS Detection
180 Cursorjacking again
181 De-cloaking in IE7.0 Via Windows Variables
182 Delta Boarding Pass Spoofing
183 Detecting browsers javascript hacks
184 Detecting Default Browser in IE
185 Detecting FireFox Extentions
186 Detecting IE in 12 bytes
187 Detecting Private Browsing Mode
188 Detecting Privoxy Users and Circumventing It
189 Detecting States of Authentication With Protected Images
190 Detecting users via Authenticated Redirects
191 DHCP Script Injection
192 Dialog Spoofing - Firefox Basic Authentication
193 Diminutive Worm, 161 byte Web Worm
194 DNS poisoning via Port Exhaustion
195 DNS Rebinding for Credential Brute Force
196 DNS Rebinding for Scraping and Spamming
197 DNS Rebinding for Scraping and Spamming
198 DNS Rebinding on Java Applets
199 Dom Flow
200 DOMinator – Finding DOMXSS with dynamic taint propagation
201 DoS attacks via Abuse of Functionality vulnerabilities
202 Double eval() for DOM based XSS
203 Double eval() for DOM based XSS
204 Drag and Drop XSS in Firefox by HTML5 (Cross Domain in frames)
205 Drag and Drop XSS in Firefox by HTML5 (Cross Domain in frames)
206 Drupal 7 Core SQLi
207 eDellRoot
208 Effects of DNS Rebinding On IE’s Trust Zones
209 Embeding SVG That Contains XSS Using Base64 Encoding in Firefox
210 Encoding Filter Bypass 
211 Encoding Filter Bypass (UTF-7, Variable Width, US-ASCII)
212 Enumerate Windows Users In JS
213 Enumerating logins via Abuse of Functionality vulnerabilities
214 Enumerating Through User Accounts
215 Eradicating DNS Rebinding with the Extended Same-Origin Policy
216 Evading All Web Application filters
217 Evading All* WAF XSS Filters
218 Evercookie
219 Exaggerating Timing Attack Results Via GET Flooding
220 Excel formula injection in Google Docs
221 Expanding the Attack Surface
222 Expanding the Attack Surface
223 Expanding the control over the operating system from the database
224 Expansions on FREAK attack
225 Expect Header Injection Via Flash
226 Exploitation of “Self-Only” Cross-Site Scripting in Google Code
227 Exploiting CSRF Protected XSS
228 Exploiting Facebook Application XSS Holes to Make API Requests
229 Exploiting IE8 UTF-7 XSS Vulnerability using Local Redirection
230 Exploiting Logged Out XSS Vulnerabilities
231 Exploiting Second Life
232 Exploiting the unexploitable XSS with clickjacking
233 Exploiting the unexploitable XSS with clickjacking
234 Exploiting Unexploitable XSS
235 Exploiting XSS in Ajax Web Applications
236 Exploiting XSS vulnerabilities on cookies
237 Exploiting XXE in File Parsing Functionality
238 Exploiting XXE in File Upload Functionality
239 Exponential XSS
240 Exponential XSS Attacks
241 Expression Language Injection
242 Expression Language Injection
243 F5 and Acunetix XSS disclosure
244 Facebook hosted DDOS with notes app
245 Facebook: Memorializing a User
246 Facebook: Memorializing a User
247 Father/Daughter Team Finds Valuable Facebook Bug
248 Favorites Gone Wild
249 File Download Injection
250 File Name Enumeration in Rails
251 File System API with HTML5 – Juice for XSS
252 FileCry
253 Filejacking: How to make a file server from your browser (with HTML5 of course)
254 Finding Weak Rails Security Tokens
255 Fireeye – Arbitrary reading and writing of the JVM process
256 Firefox 2 and WebKit nightly cross-domain image theft
257 Firefox cross-domain information theft (simple text strings, some CSV)
258 Firefox File Handling Woes
259 Firefox Header Redirection JavaScript Execution
260 Firefox Popup Blocker Allows Reading Arbitrary Local Files
261 Firefox XML injection into parse of remote XML
262 Firefox’s JAR: Protocol issues
263 Firefoxurl URI Handler Flaw
264 Flash Camera and Mic Remember Function and XSS
265 Flash clipboard Hijack
266 Flash Cookie Object Tracking
267 Flash Internet Explorer security model bug
268 Flash Origin Policy Issues
269 Flash Parameter Injection 
270 FlashFlood
271 Flickr's API Signature Forgery Vulnerability (MD5 extension attack)
272 Fooling B64_Encode(Payload) on WAFs and filters
273 Forget sidejacking, clickjacking, and carjacking: enter “Formjacking”
274 Forging HTTP request headers with Flash
275 Forging HTTP request headers with Flash
276 Formaction Scriptless attack updates
277 Frame Injection Fun
278 FREAK(Factoring attack on RSA-Export Keys)
279 Free MacWorld Platinum Pass? Yes in 2008!
280 Fun with data: URLs
281 Generic cross-browser cross-domain theft
282 Generic cross-browser cross-domain theft 
283 Generic cross-browser cross-domain theft 
284 Get Internal Network Information with Java Applets
285 Get Internal Network Information with Java Applets
286 GIFAR 
287 Gmail - Google Docs Cookie Hijacking through PDF Repurposing &PDF
288 Google Adsense CSRF hole
289 Google Docs puts Google Users at Risk
290 Google Dorks Strike Again
291 Google Drive SSO Phishing
292 Google GMail E-mail Hijack Technique
293 Google Hacks On Your Behalf
294 Google Chrome HTTP AUTH Dialog Spoofing through Realm Manipulation
295 Google Chrome/ChromeOS sandbox side step via owning extensions
296 Google Chrome/ChromeOS sandbox side step via owning extensions
297 Google Indexes XSS
298 Google plugs phishing hole
299 Google Translate - Google User Content - File Uploading Cross - XSS and Design Stringency - A Talk
300 Google Two-Factor Authentication Bypass
301 Google Urchin password theft madness
302 Google User De-Anonymization
303 Google Vulnerable Code Dork
304 Governator Hack
305 Gravatar Email Enumeration in JavaScript
306 Hacker scans the internet
307 Hacking Auto-Complete (Safari v1, Safari v2 TabHack, Firefox,Internet Explorer)
308 Hacking CSRF Tokens using CSS History Hack
309 Hacking Facebook with HTML5
310 Hacking Facebook with HTML5
311 Hacking Intranets Through Web Interfaces
312 Hacking Intranets Via Brute Force
313 Hacking PayPal Accounts with 1 Click
314 Hacking RSS Feeds
315 Hacking without 0days: Drive-by Java
316 Hash Information Disclosure Via Collisions - The Hard Way
317 HashDOS: Effective Denial of Service attacks against web application platforms
318 Heartbleed
319 Hellfire for redirectors
320 Hidden XSS Attacking the Desktop & Mobile Platforms
321 Hiding JS in Valid Images
322 Hijacking Opera’s Native Page using malicious RSS payloads
323 Hijacking Safari 4 Top Sites with Phish Bombs
324 HikaShop Object Injection
325 HostGator: cPanel Security Hole Exploited in Mass Hack
326 Hostile Subdomain Takeover using Heroku/Github/Desk + more
327 Hostile Subdomain Takeover using Heroku/Github/Desk 
328 How Facebook lacked X-Frame-Options and what I did with it
329 How I hacked GitHub again
330 How I hacked Instagram to see your private photos
331 How I Hacked StackOverflow
332 How to Conceal XSS Injection in HTML5
333 How to Conceal XSS Injection in HTML5
334 How to defeat digg.com
335 How to get linked from Slashdot
336 How to get SQL query contents from SQL injection flaw
337 How to get SQL query contents from SQL injection flaw
338 How To Own Every User On A Social Networking Site
339 How to upload arbitrary file contents cross-domain
340 How to upload arbitrary file contents cross-domain (2)
341 How to use Google Analytics to DoS a client from some website.
342 HOW TO: Spy on the Webcams of Your Website Visitors
343 HScan Redux
344 HTML/CSS Injections - Primitive Malicious Code
345 HTML+TIME XSS attacks
346 HTML5 Hard Disk Filler™ API
347 HTML5 new XSS vectors
348 HTML5 XSS
349 HTTP Parameter Pollution (HPP)
350 HTTP POST DoS
351 HTTP Proxies Bypass Firewalls
352 HTTP Response Splitting and Data: URI scheme in Firefox
353 Hunting ASynchronous Vulnerabilities
354 Hyperlink Spoofing and the Modern Web
355 Chrome addon hacking (2, 3, 4, 5)
356 Chrome and Safari users open to stealth HTML5 AppCache attack
357 Chronofeit Phishing
358 Chronofeit Phishing
359 I know what your friends did last summer
360 I know what your friends did last summer
361 I know what you've got (Firefox Extensions)
362 I know where you've been
363 I used to know what you watched, on YouTube (CSRF + Crossdomain.xml)
364 IE "Print Table of Links" Cross-Zone Scripting Vulnerability
365 IE 7 and Firefox Browsers Digest Authentication Request Splitting
366 IE Sends Local Addresses in Referer Header
367 IE11 RCE
368 IE6.0 Protocol Guessing
369 IE7.0 Detector
370 IE8 Link Spoofing - Broken Status Bar Integrity
371 IE9 Self-XSS Blackbox Protection bypass
372 Iframe HTTP Ping
373 IIS5.1 Directory Authentication Bypass by using ":$I30:$Index_Allocation"
374 IIS6/ASP & file upload for fun and profit
375 IIS6/ASP & file upload for fun and profit
376 illusoryTLS
377 Image Names Gone Bad
378 IMAP Vulnerable to XSS
379 Improving HTTPS Side Channel Attacks
380 Improving HTTPS Side Channel Attacks
381 Initiating Probes Against Servers Via Other Servers
382 Injecting the script tag into XML
383 Inline UTF-7 E4X javascript hijacking
384 Inline UTF-7 E4X javascript hijacking
385 Inter Protocol Exploitation
386 Internal Port Scanning via Crystal Reports
387 Internal Port Scanning via Crystal Reports
388 Internet Archiver Port Scanner
389 Internet Explorer 7 "mhtml:" Redirection Information Disclosure
390 iPhone SSL Warning and Safari Phishing
391 ISO-8895-1 Vulnerable in Firefox to Null Injection
392 itms Decloaking
393 James Bennett – Django DOS
394 Java Applet Same IP Host Access
395 Java Applet Same-Origin Policy Bypass via HTTP Redirect
396 Java Applet DNS Rebinding
397 Java Applets and DNS Rebinding
398 Java Deserialization w/ Apache Commons Collections in WebLogic, WebSphere, JBoss, Jenkins, and OpenNMS
399 Java DSN Rebinding + Java Same IP Policy = The Internet Mayhem
400 Java JAR Attacks and Features
401 JavaScript Code Flow Manipulation
402 JavaScript Global Namespace Pollution
403 JavaScript Port Scanning
404 JavaScript Portscanning and bypassing HTTP Auth
405 JavaSnoop
406 JavaSnoop
407 Join a Religion Via CSRF
408 JSON Hijacking with UTF-7
409 JSON-based XSS exploitation
410 Jumping out of Touch Screen Kiosks
411 Kindle Touch (5.0) Jailbreak/Root and SSH
412 Kindle Touch (5.0) Jailbreak/Root and SSH
413 Large Scale Detection of DOM based XSS
414 Launch any file path from web page
415 Linskys E420 Authentication Bypass Disclosure
416 Local DoS on CUPS to a remote exploit via specially-crafted webpage
417 Local DoS on CUPS to a remote exploit via specially-crafted webpage (1)
418 LocalRodeo Detection
419 Location based XSS attacks
420 Login Detection without JavaScript
421 LogJam
422 Lost in Translation (ASP’s HomoXSSuality)
423 Lost in Translation (ASP’s HomoXSSuality)
424 Lotus Notes Formula Injection
425 Lucky 13 Attack
426 Magic Hashes
427 Malformed URL in Image Tag Fingerprints Internet Explorer
428 Mapping a web browser to GPS coordinates via router XSS + Google Location Services without prompting the user
429 Mapping a web browser to GPS coordinates via router XSS + Google Location Services without prompting the user
430 Mario Heiderich – Mutation XSS
431 MD5 extension attack
432 Metaverse breached: Second Life customer database hacked
433 Microsoft ASP.NET Request Validation Bypass Vulnerability
434 Microsoft ASP.NET Request Validation Bypass Vulnerability (POC)
435 Microsoft IIS 0-Day Vulnerability Parsing Files (semi‐colon bug)
436 Microsoft IIS with Metasploit evil.asp;.jpg
437 Microsoft SChannel Vulnerability
438 Million Browser Botnet Video Briefing
439 Millions of PDF invisibly embedded with your internal disk paths
440 Millions of PDF invisibly embedded with your internal disk paths
441 Misfortune Cookie – TR-069 ACS Vulnerabilities in residential gateway routers
442 MITM attack to overwrite addons in Firefox
443 MitM DNS Rebinding SSL/TLS Wildcards and XSS
444 More Port Scanning - This Time in Flash
445 More URI Stuff… (IE’s Resouce URI)
446 MSIE Flash 0day targeting french aerospace
447 MSWord Scripting Object XSS Payload Execution Bug and Random CLSID Stringency
448 Multi-pass filters bypass
449 Multiple Facebook Messenger CSRF’s
450 Multiple vulnerabilities in Apache Struts2 and property oriented programming with Java
451 Multiviews Apache, Accept Requests and free listing
452 MX Injection : Capturing and Exploiting Hidden Mail Servers
453 MySQL and SQL Column Truncation Vulnerabilities
454 MySQL Stacked Queries with SQL Injection...sort of
455 MySQL Stacked Queries with SQL Injection...sort of
456 NAT Pinning: Penetrating routers and firewalls from a web page
457 NAT Pinning: Penetrating routers and firewalls from a web page (forcing router to port forward)
458 Navigation Hijacking (Frame/Tab Injection Attacks)
459 Net Cross Site Scripting – Request Validation Bypassing (
460 Netflix.com XSRF vuln
461 Network Scanning with HTTP without JavaScript
462 New Evasions for Web Application Firewalls
463 New Methods in Automated XSS Detection: Dynamic XSS Testing Without Using Static Payloads
464 New PHPIDS vector
465 Next Generation Clickjacking
466 Nikon magazine hit with security breach
467 No Alnum JavaScript (cheat sheet, jjencode demo)
468 NODE.JS CONNECT CSRF BYPASS ABUSING METHODOVERRIDE MIDDLEWARE
469 Noisy Decloaking Methods
470 Non-Alpha-Non-Digit 3
471 Non-Obvious (Crypto) Bugs by Example
472 NoScript Bypass - "Reflective XSS" through Union SQL Poisoning Trick
473 NoScript Bypass - "Reflective XSS" through Union SQL Poisoning Trick
474 NTLM Relay via HTTP to internet or stealing windows user hashes while using java client
475 NULLs in entities in Firefox
476 NULLs in entities in Firefox
477 One vector to rule them all
478 OpenSSL CVE-2014-0224
479 Opera XSS vectors
480 Opera XSS vectors
481 Optimizing the number of requests in blind SQL injection
482 Our Favorite XSS Filters and how to Attack them
483 overwriting cookies on other people’s domains in Firefox. 
484 'Padding Oracle' Crypto Attack
485 'Padding Oracle' Crypto Attack (poet, Padbuster, demo,ASP.NET)
486 padding oracle web attack (poet, Padbuster, demo)
487 Paper on Hacking Intranets Using Websites (Not Web Browsers)
488 Parasitic computing using ‘Cloud Browsers’ (2)
489 Passing Malicious PHP Through getimagesize()
490 Password extraction from Ajax/DOM/HTML5 routine
491 Password mining from AWS/Parse Tokens
492 Pawn Storm (CVE-2015-7645)
493 Pawnstorm
494 Paypal Manager Account Hijack
495 PayPal Security Flaw allows Identity Theft
496 PDF XSS Can Compromise Your Machine
497 Penetrating Intranets through Adobe Flex Applications
498 Performing DDoS attacks with HTML5 Cross Origin Requests & WebWorkers
499 Permanent backdooring of HTML5 client-side application
500 Permanent backdooring of HTML5 client-side application [Apture example]
501 Persistent Cookies
502 Persistent Cookies and DNS Rebinding Redux
503 Persistent Cross Interface Attacks
504 Persistent SQL Injection
505 Phil Purviance – Don’t Use Linksys Routers
506 PHPIDS bypass
507 phpwn: Attack on PHP sessions and random numbers
508 phpwn: Attack on PHP sessions and random numbers
509 Ping pong obfuscation
510 Pixel Perfect Timing Attacks with HTML5
511 Poisoning proxy caches using Java/Flash/Web Sockets
512 Poking new holes with Flash Crossdomain Policy Files
513 Poodle
514 Popup & Focus URL Hijacking
515 Popup & Focus URL Hijacking
516 Port Scan without JavaScript
517 Port Scanning with HTML5 and JS-Recon
518 Port Scanning with HTML5 and JS-Recon
519 Posting raw XML cross-domain
520 Practical Timing Attacks using Mathematical Amplification of Time Difference in == Operator
521 Pulling system32 out over blind SQL Injection
522 Pure Java™, Pure Evil™ Popups
523 Pwning Opera Unite with Inferno’s Eleven
524 Pwning Opera Unite with Inferno’s Eleven
525 Pwning via SSRF (memcached, php-fastcgi, e
526 PXSS on long length videos to DOS
527 Quick Proxy Detection
528 Quicky Firefox DoS
529 Quicky Firefox DoS
530 Racing to downgrade users to cookie-less authentication
531 Random Number Security in Python
532 Rapid history extraction through non-destructive cache timing (v8)
533 RCE through mangled WAR upload into Tomcat App Manager using PUT-in-Gopher-over-XXE (1)
534 Read Firefox Settings (PoC)
535 Recursive DNS Resolver (DOS)
536 Recursive File Include DoS
537 Recursive Request DoS
538 Redirector’s hell
539 Reflected File Download
540 Relative Path Overwrite
541 Remote File Upload Vulnerability in WordPress MailPoet Plugin (wysija-newsletters)
542 Res Timing Attack
543 Res Timing File Enumeration Without JavaScript in IE7.0
544 Res:// Protocol Local File Enumeration
545 Residential Gateway “Misfortune Cookie”
546 Response Splitting Filter Evasion
547 Results, Unicode Left/Right Pointing Double Angel Quotation Mark
548 Re-visiting JAVA De-serialization: It can't get any simpler than this !!
549 RevSlider
550 RFC 1918 Blues
551 RFC1918 Caching Security Issues
552 Rosetta Flash
553 Ruby on Rails Session Termination Design Flaw
554 Safari Carpet Bomb
555 Safari Carpet Bomb 
556 Safari pwns Internet Explorer
557 Same Origin Bypass in Adobe Reader CVE-2014-8453
558 Same Origin Bypassing Using Image Dimensions
559 Same Origin Spoofing to Attack Client Certificate Sessions
560 Scanning internal Lan with PHP remote file opening.
561 Scraping & Spamming
562 Selecting Encoding Methods For XSS Filter Evasion
563 Server Side Template Injection
564 Server-Side Template Injection: RCE for the Modern Web App
565 Session Extending
566 Session Fixation
567 Session Fixation Via DNS Rebinding
568 Session Fixation Via DNS Rebinding
569 Session Puzzling (aka Session Variable Overloading)
570 Session Puzzling (aka Session Variable Overloading) 
571 setTimeout Clickjacking
572 Severe XSS in Google and Others due to the JAR protocol issues
573 ShellShock
574 Side Channel Attacks in SSL
575 Site Plagiarizes Blog Posts, Then Files DMCA Takedown on Originals
576 Skype cross-zone scripting vulnerability
577 Slideshare
578 Slowloris HTTP DoS
579 Slowloris HTTP DoS
580 SMB Decloaking
581 SMBEnum
582 SMTP Injection via Recipient Email Address
583 Smuggling SMTP through open HTTP proxies
584 SNMP XSS Attack
585 Soaksoak WordPress Malware
586 Social Networks Evil Twin Attacks
587 Socket Capable Browser Plugins Result In Transparent Proxy Abuse
588 Socket Capable Browser Plugins Result In Transparent Proxy Abuse
589 Spoofing Firefox protected objects
590 SpyTunes: Find out what iTunes music someone else has
591 SQL Smuggling
592 SQLi filter evasion cheat sheet (MySQL)
593 SSID Script Injection
594 St. Louis Federal Reserve DNS Redirect
595 Steal History without JavaScript
596 Stealing Basic Auth with Persistent XSS
597 Stealing entire Auto-Complete data in Google Chrome
598 Stealing Mouse Clicks for Banner Fraud
599 Stealing Pictures with Picasa
600 Stealing Search Engine Queries with JavaScript
601 Stealing User Information Via Automatic Form Filling
602 Stealth Cookie Stealing (new XSS technique)
603 Steam Browser Protocol Insecurity
604 Stiltwalker, exploits weaknesses in the audio version of reCAPTCHA
605 Stored XSS Vulnerability @ Amazon
606 Stripping Referrer for fun and profit
607 Stroke triggered XSS and StrokeJacking
608 Strokejacking
609 Strokejacking
610 Struts 2 OGNL Double Evaluation RCE
611 Stuffing Javascript into DNS names
612 Superfish SSL MitM
613 SurveyMonkey: IP Spoofing
614 Tabnabbing: A New Type of Phishing Attack
615 Tapjacking: owning smartphone browsers
616 Temporal Session Race Conditions Video 2
617 Text-based CAPTCHA Strengths and Weaknesses
618 The “I Know…” series. What websites know about you
619 The Attack of the TINY URLs
620 The Case of the Unconventional CSRF Attack in Firefox
621 The curse of inverse strokejacking
622 The Failure of Noise-Based Non-Continuous Audio Captchas
623 The New Age of XXE
624 The old is new, again. CVE20112461 is back!
625 The PayPal 2FA Bypass
626 The Unexpected Dangers of Dynamic JavaScript
627 The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
628 There’s an OAK TREE in my blog!?!?!
629 Timing Attacks on CSS Shaders
630 Timothy Morgan – What You Didn’t Know About XML External Entity Attacks
631 Timur Yunusov and Alexey Osipov – XML Out of Band Data Retrieval
632 Top 3 Proxy Issues That No One Ever Told You
633 Top-Level Universal XSS
634 Tor Hidden-Service Passive De-Cloaking
635 Total surveillance made easy with VoIP phone
636 Tracking users that block cookies with a HTTP redirect
637 Tracking users that block cookies with a HTTP redirect
638 Tunneling TCP over HTTP over SQL Injection 
639 Tunneling tcp over http over sql-injection
640 Turn Any Page Into A Greasemonkey Popup
641 Turning XSS into Clickjacking
642 Turning XSS into Clickjacking
643 TweetDeck XSS
644 Twitter misidentifying context
645 UI Redressing Mayhem: Firefox 0-Day And The LeakedIn Affair
646 UI Redressing Mayhem: HTTPOnly Bypass PayPwn Style
647 UI Redressing: Attacks and Countermeasures Revisited
648 Unauthenticated Backup and Password Disclosure In HandsomeWeb SOS Webpages cve-2014-3445
649 Unauthorized TinyURL URL Enumeration Vulnerability
650 Understanding and Managing Entropy Usage
651 Universal XSS in Adobe’s Acrobat Reader Plugin
652 Universal XSS in IE8
653 Universal XSS in IE8 
654 Untangling The DOM For More Easy-Juicy Bugs
655 UPnP Hacking via Flash
656 URL Hiding - new method of URL Spoofing attacks
657 URL Hiding - new method of URL Spoofing attacks
658 URL Spoofing vulnerability in bots of search engines 
659 URL Spoofing vulnerability in bots of search engines (#2)
660 Username Enumeration Timing Attacks (Sensepost)
661 Username Enumeration Vulnerabilities
662 Using Blended Browser Threats involving Chrome to steal files on your computer
663 Using Cookies For Selective DoS and State Detection
664 Using Cross-domain images in WebGL and Chrome 13
665 Using CSS to De-Anonymize
666 Using HTTP headers pollution for mobile networks attacks (2)
667 Using POST method to bypass IE-browser protected XSS
668 Using the HTML5 Fullscreen API for Phishing Attacks
669 Using WordPress as a intranet and internet port scanner
670 Using your browser URL history to estimate gender
671 Variable Width Encoding
672 Visitor Tracking Without Cookies (or How To Abuse HTTP 301s)
673 Weaknesses in RC4
674 Web Browser History Stealing
675 Web Browser Intranet Hacking / Port Scanning 
676 Web Mayhem: Firefox’s JAR: Protocol issues
677 Web pages Detecting Virtualized Browsers and other tricks
678 Web Timing Attacks Made Practical
679 Web Worms
680 Web Worms 
681 Who Are You? A Statistical Approach to Protecting LinkedIn Logins(CSS UI Redressing Issue)
682 Widespread XSS for Google Search Appliance
683 Will it Blend?
684 Winning the Online Banking War
685 WordPress Core RCE
686 Xanga Hit By Script Worm
687 X-Frame-Options (XFO) Detection from Javascript
688 XML Intranet Port Scanning
689 XMLHTTPReqest “Ping” Sweeping in Firefox 3.5+
690 XSHM Mark 2
691 XSS Fragmentation Attacks
692 XSS in Skype for iOS
693 XSS Relocation Attacks through Word Hyperlinking
694 XSS Relocation Attacks through Word Hyperlinking
695 XSS Vulnerabilities in Common Shockwave Flash Files
696 XSS: Gaining access to HttpOnly Cookie in 2012
697 XSSing client-side dynamic HTML includes by hiding HTML inside images and more
698 XSSing client-side dynamic HTML includes by hiding HTML inside images and more
699 XSS-Track as a HTML5 WebSockets traffic sniffer
700 XSS-Track: How to quietly track a whole website through single XSS
701 Yahoo Babelfish - Possible Frame Injection Attack - Design Stringency
702 Yes, you can have fun with downloads
703 Zach Cutlip – Remote Code Execution in Netgear routers