101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

483
active users

#xss

0 posts0 participants0 posts today
The New Oil<p>Who Got Arrested in the Raid on the <a href="https://mastodon.thenewoil.org/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> Crime Forum?</p><p><a href="https://krebsonsecurity.com/2025/08/who-got-arrested-in-the-raid-on-the-xss-crime-forum/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">krebsonsecurity.com/2025/08/wh</span><span class="invisible">o-got-arrested-in-the-raid-on-the-xss-crime-forum/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a> arrests suspected admin of <a href="https://mastodon.thenewoil.org/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> Russian hacking forum</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-arrests-suspected-admin-of-xss-russian-hacking-forum/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/ukraine-arrests-suspected-admin-of-xss-russian-hacking-forum/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mastodon.thenewoil.org/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Hackread.com<p>New: Just a day after its seizure and admin arrest, cybercrime forum <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> is back online via its mirror and dark web domains... but with many questions, rumors and a lack of trust.</p><p>Read: <a href="https://hackread.com/cybercrime-forum-xss-returns-mirror-dark-web-seizure/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/cybercrime-forum-</span><span class="invisible">xss-returns-mirror-dark-web-seizure/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/XSSIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSSIS</span></a> <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mstdn.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a></p>
Hackread.com<p>The Russian language cybercrime forum <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> has been seized after its suspected admin was arrested in <a href="https://mstdn.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a>, however its dark web and mirror domains only show a 504 Gateway Timeout error.</p><p>Read: <a href="https://hackread.com/xss-is-cybercrime-forum-seized-ukraine-arrested-admin/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/xss-is-cybercrime</span><span class="invisible">-forum-seized-ukraine-arrested-admin/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mstdn.social/tags/DarkWeb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkWeb</span></a></p>
Hackread.com<p>Suspected admin of XSS.IS, one of the most notorious Russian-language cybercrime forums, has been arrested in Ukraine.</p><p>Read: <a href="https://hackread.com/suspected-xss-is-admin-cybercrime-forum-arrest-ukraine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/suspected-xss-is-</span><span class="invisible">admin-cybercrime-forum-arrest-ukraine/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a> <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mstdn.social/tags/France" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>France</span></a> <a href="https://mstdn.social/tags/Ukraine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ukraine</span></a></p>
Hackread.com<p>🚨 Former US soldier Cameron Wagenius has pleaded guilty to hacking telecom companies stealing data, and running an extortion scheme via XSS and BreachForums.</p><p>Details: <a href="https://hackread.com/us-soldier-cameron-wagenius-guilty-telecom-hacking-extortion/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/us-soldier-camero</span><span class="invisible">n-wagenius-guilty-telecom-hacking-extortion/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://mstdn.social/tags/CameronWagenius" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CameronWagenius</span></a> <a href="https://mstdn.social/tags/BreachForums" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BreachForums</span></a> <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p>
Frontend Dogma<p>HTML Spec Change: Escaping “&lt;” and “&gt;” in Attributes, by <span class="h-card" translate="no"><a href="https://infosec.exchange/@securitymb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>securitymb</span></a></span> (<span class="h-card" translate="no"><a href="https://chromium.social/@developers" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>developers</span></a></span>):</p><p><a href="https://developer.chrome.com/blog/escape-attributes" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">developer.chrome.com/blog/esca</span><span class="invisible">pe-attributes</span></a></p><p><a href="https://mas.to/tags/html" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>html</span></a> <a href="https://mas.to/tags/attributes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attributes</span></a> <a href="https://mas.to/tags/escaping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>escaping</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
Tanya Janca | SheHacksPurple :verified: :verified:<p>🎥 Missed one of my past conference talks? Let’s fix that.</p><p>I’m sharing my favorites—packed with real-world advice, lessons, and a few laughs.</p><p>“XSS Deep Dive”<br>📽️ <a href="https://twp.ai/4in9ro" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">twp.ai/4in9ro</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/owasp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>owasp</span></a> <a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
Frontend Dogma<p>Escaping “&lt;” and “&gt;” in Attributes—How It Helps Protect Against Mutation XSS, by <span class="h-card" translate="no"><a href="https://infosec.exchange/@securitymb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>securitymb</span></a></span>:</p><p><a href="https://bughunters.google.com/blog/5038742869770240/escaping-and-in-attributes-how-it-helps-protect-against-mutation-xss" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bughunters.google.com/blog/503</span><span class="invisible">8742869770240/escaping-and-in-attributes-how-it-helps-protect-against-mutation-xss</span></a></p><p><a href="https://mas.to/tags/html" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>html</span></a> <a href="https://mas.to/tags/attributes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>attributes</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a> <a href="https://mas.to/tags/escaping" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>escaping</span></a> <a href="https://mas.to/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://mas.to/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> <a href="https://mas.to/tags/browsers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>browsers</span></a></p>
sekurak News<p>Masz wystawioną do Internetu Grafanę? Lepiej do niej zerknij… możliwe przejęcie konta</p><p>Grafana to otwartoźródłowa platforma do analizy i prezentacji danych, szeroko stosowana nie tylko w IT. Pozwala tworzyć panele prezentujące różne metryki, co powoduje, że jest popularnym rozwiązaniem wśród inżynierów IT i adminstratorów. Użytkownikom “domowym” może być znana między innymi z paneli prezentujących informacje udostępniane przez urządzenia klasy smart home (np....</p><p><a href="https://mastodon.com.pl/tags/WBiegu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WBiegu</span></a> <a href="https://mastodon.com.pl/tags/AccountTakeover" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AccountTakeover</span></a> <a href="https://mastodon.com.pl/tags/Grafana" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Grafana</span></a> <a href="https://mastodon.com.pl/tags/Js" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Js</span></a> <a href="https://mastodon.com.pl/tags/Openredirect" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Openredirect</span></a> <a href="https://mastodon.com.pl/tags/Websec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Websec</span></a> <a href="https://mastodon.com.pl/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p><p><a href="https://sekurak.pl/masz-wystawiona-do-internetu-grafane-lepiej-do-niej-zerknij-mozliwe-przejecie-konta/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sekurak.pl/masz-wystawiona-do-</span><span class="invisible">internetu-grafane-lepiej-do-niej-zerknij-mozliwe-przejecie-konta/</span></a></p>
Hackread.com<p>⚠️ Critical <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> flaw actively exploited in Zimbra Collaboration Suite, putting over 129,000 servers at risk. Researchers suspect involvement of <a href="https://mstdn.social/tags/Sednit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sednit</span></a> (aka Fancy Bear).</p><p>Read: <a href="https://hackread.com/zimbra-cve-2024-27443-xss-flaw-hit-sednit-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/zimbra-cve-2024-2</span><span class="invisible">7443-xss-flaw-hit-sednit-servers/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/FancyBear" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FancyBear</span></a> <a href="https://mstdn.social/tags/Zimbra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Zimbra</span></a></p>
heise online English<p>Kunbus RevolutionPi: CISA warning about security vulnerabilities</p><p>Several gaps affect PiCtory, a web application for configuring the mini industrial systems. Kunbus has published patches and its own warning messages.</p><p><a href="https://www.heise.de/en/news/Kunbus-RevolutionPi-CISA-warning-about-security-vulnerabilities-10372387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Kunbus-Revolu</span><span class="invisible">tionPi-CISA-warning-about-security-vulnerabilities-10372387.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Kunbus RevolutionPi: CISA-Warnung vor Sicherheitslücken</p><p>Mehrere Lücken betreffen PiCtory, eine Webapplikation zur Konfiguration der Mini-Industriesysteme. Kunbus hat Patches und eigene Warnmeldungen veröffentlicht.</p><p><a href="https://www.heise.de/news/Kunbus-RevolutionPi-CISA-Warnung-vor-Sicherheitsluecken-10372184.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Kunbus-Revolutio</span><span class="invisible">nPi-CISA-Warnung-vor-Sicherheitsluecken-10372184.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/IdentityManagement" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IdentityManagement</span></a> <a href="https://social.heise.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Frontend Dogma<p>How to Protect Your Web Applications From XSS, by <span class="h-card" translate="no"><a href="https://mastodon.social/@torgo" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>torgo</span></a></span> (<span class="h-card" translate="no"><a href="https://w3c.social/@w3c" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>w3c</span></a></span>):</p><p><a href="https://www.w3.org/blog/2025/how-to-protect-your-web-applications-from-xss/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">w3.org/blog/2025/how-to-protec</span><span class="invisible">t-your-web-applications-from-xss/</span></a></p><p><a href="https://mas.to/tags/howtos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>howtos</span></a> <a href="https://mas.to/tags/webapps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>webapps</span></a> <a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/xss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xss</span></a></p>
Hackread.com<p>🚨 Over 350 high-profile websites hit by 360XSS attack! Hackers exploited a <a href="https://mstdn.social/tags/Krpano" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Krpano</span></a> XSS flaw to hijack search results &amp; distribute spam ads on government, university, &amp; news sites.</p><p>Read: <a href="https://hackread.com/over-350-high-profile-websites-hit-by-360xss-attack/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/over-350-high-pro</span><span class="invisible">file-websites-hit-by-360xss-attack/</span></a></p><p><a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://mstdn.social/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://mstdn.social/tags/SEO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SEO</span></a></p>
Niebezpiecznik News<p>Jak wykryć (i poprawnie załatać) XSS w swoich webaplikacjach?</p><p>Kuba, nasz wieloletni trener szkolenia “Atakowanie i Ochrona Webaplikacji” przygotował krótki, ale mocno treściwy kurs online, który skupia się XSS, czyli na najpowszechniejszej dziurze w webaplikacjach. I zapewne poprzednie zdanie sporą część z Was już&nbsp;przekonało do zakupu, więc tutaj link wprost do koszyka. A dla reszty poniżej umieszczamy krótki opis, dlaczego warto zapoznać&nbsp;się&nbsp;z tym materiałem:<br> 30 lekcji video, ~3h nagrań<br> wieczysty dostęp do materiałów, oglądasz kiedy Ci pasuje i ile razy chcesz<br> platforma z labami, dzięki której szybko nabierzesz wprawy oraz przećwiczysz materiał i narzędzia w praktyce<br> dodatkowe notatki do lekcji<br> doświadczony trener, który ma praktyczną&nbsp;wiedzę z zakresu bezpieczeństwa webaplikacji<br> certyfikat udziału, więc części z Was ten kurs może opłacić pracodawca<br>Kurs porusza tematykę od strony ofensywnej (zarówno w wariancie ręcznego testowania webaplikacji, jak i narzędzi wyszukujących podatności w sposób automatyczny) oraz od strony defensywnej&nbsp;(np. nagłówki bezpieczeństwa dotyczące XSS takie jak Content Security Policy).<br>Poznaj techniki ataków XSS, które dotyczą większości współczesnych webaplikacji. Naucz się obsługi narzędzi, dzięki którym będziesz w stanie samodzielnie namierzyć dziury w Twoich serwisach internetowych, zanim zrobią to inni. Zwiększ kompetencje swojego firmowego zespołu o aspekty cyberbezpieczeństwa. <br> Zobacz pełną agendę i lekcję&nbsp;demo na stronie kursu. <br>Ile to kosztuje?<br>To pierwsza edycja tego kursu, więc sprzedajemy go za jedyne 366zł. Ale uwaga! Sprzedaż potrwa tylko do 10 marca 23:59. Potem cena znacząco wzrośnie, a taniej nigdy nie będzie. <br>Aktualna cena to kwota [...]</p><p><a href="https://mastodon.com.pl/tags/JakubMrugalski" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>JakubMrugalski</span></a> <a href="https://mastodon.com.pl/tags/KursXSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KursXSS</span></a> <a href="https://mastodon.com.pl/tags/Niebezpiecznik" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Niebezpiecznik</span></a> <a href="https://mastodon.com.pl/tags/SzkoleniaOnline" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SzkoleniaOnline</span></a> <a href="https://mastodon.com.pl/tags/SzkoleniaPrzezInternet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SzkoleniaPrzezInternet</span></a> <a href="https://mastodon.com.pl/tags/SzkoleniaZCyberbezpiecze%C5%84%C5%9Btwa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SzkoleniaZCyberbezpieczeńśtwa</span></a> <a href="https://mastodon.com.pl/tags/SzkoleniaZdalne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SzkoleniaZdalne</span></a> <a href="https://mastodon.com.pl/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a></p><p><a href="https://niebezpiecznik.pl/post/jak-wykryc-i-poprawnie-zalatac-xss-w-swoich-webaplikacjach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">niebezpiecznik.pl/post/jak-wyk</span><span class="invisible">ryc-i-poprawnie-zalatac-xss-w-swoich-webaplikacjach/</span></a></p>
V0lk3n :verified:<p>I published my WriteUp of MagicGardens box from @hackthebox_eu</p><p>👇👇👇</p><p><a href="https://v0lk3n.github.io/writeup/HackTheBox/Box/MagicGardens/HTB-MagicGardens_WriteUp" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">v0lk3n.github.io/writeup/HackT</span><span class="invisible">heBox/Box/MagicGardens/HTB-MagicGardens_WriteUp</span></a></p><p>I hope that you will like it :)</p><p><a href="https://infosec.exchange/tags/HTB" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HTB</span></a> <a href="https://infosec.exchange/tags/BufferOverflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BufferOverflow</span></a> <a href="https://infosec.exchange/tags/CSRF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CSRF</span></a> <a href="https://infosec.exchange/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://infosec.exchange/tags/DevTools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DevTools</span></a> <a href="https://infosec.exchange/tags/Missconfiguration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Missconfiguration</span></a> <a href="https://infosec.exchange/tags/docker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>docker</span></a> <a href="https://infosec.exchange/tags/django" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>django</span></a> <a href="https://infosec.exchange/tags/Pentest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentest</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackTheBox</span></a></p>
heise online English<p>Patch now: Cross-site scripting and denial of service possible in GitLab</p><p>GitLab warns of three vulnerabilities, one of which has a threat level of "high". Patches are available for the newer versions. </p><p><a href="https://www.heise.de/en/news/Patch-now-Cross-site-scripting-and-denial-of-service-possible-in-GitLab-10255012.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Patch-now-Cro</span><span class="invisible">ss-site-scripting-and-denial-of-service-possible-in-GitLab-10255012.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.heise.de/tags/DoSSchwachstelle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoSSchwachstelle</span></a> <a href="https://social.heise.de/tags/Git" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Git</span></a> <a href="https://social.heise.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Versionskontrolle" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Versionskontrolle</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise online English<p>Home server operating system: Updates fix security vulnerabilities in Unraid</p><p>Attackers could exploit the gaps to inject their own JavaScript code or malicious plug-ins into the UnRAID admin.</p><p><a href="https://www.heise.de/en/news/Home-server-operating-system-Updates-fix-security-vulnerabilities-in-Unraid-10253478.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Home-server-o</span><span class="invisible">perating-system-Updates-fix-security-vulnerabilities-in-Unraid-10253478.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.heise.de/tags/NAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NAS</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Heimserver-Betriebssystem: Updates beheben Sicherheitslücken in Unraid</p><p>Angreifer könnten die Lücken ausnutzen, um dem UnRAID-Admin eigenen Javascript-Code oder bösartige Plug-ins unterzuschieben.</p><p><a href="https://www.heise.de/news/Heimserver-Betriebssystem-Updates-beheben-Sicherheitsluecken-in-Unraid-10253366.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Heimserver-Betri</span><span class="invisible">ebssystem-Updates-beheben-Sicherheitsluecken-in-Unraid-10253366.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/XSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XSS</span></a> <a href="https://social.heise.de/tags/NAS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NAS</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>