27 vulnerabilities to look out for in Python applications: Arbitrary file writes, directory traversal, deserialization, and more…

Photo by Hitesh Choudhary on Unsplash

Lesson learned, and what we can expect going forward

Photo by Math on Unsplash

What happened

Unauthenticated RCE in critical Java logging utility Log4j

What is affected?

Using Ocular to search for command injection in an application by tracing dataflow

Remote code execution and command injection

30 vulnerabilities to look out for in Java applications: Arbitrary file writes, directory traversal, deserialization, and more…

Photo by Cookie the Pom on Unsplash

Using Ocular to search for reflected XSS in an application

How XSS happens

The top ten vulnerabilities that threaten your API, how to identify them, and how to prevent them

Vickie Li

Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store