Bypassing Origin Checks Using Trailing Dot TrickBy Shahrokh Ataei & Ali Soltani Penetration Tester | Web Security Researcher | Bug Bounty HunterMay 28A response icon3May 28A response icon3
Unauthenticated SharePoint File Enumeration and DownloadingHi, I’m Ali Soltani, a passionate pentester with a focus on web application security and CVE research. During one of my recent security…Mar 4A response icon2Mar 4A response icon2
Uncovering IDOR and Stored XSS Vulnerabilities( Deep Dive into Ticketing System Exploits )Hi, I’m Ali Soltani, a passionate pentester with a focus on web application security and CVE research. I’ve always been fascinated by…Nov 21, 2024A response icon1Nov 21, 2024A response icon1
Decoding the Enigma: A Deep Dive into the /home/000~ROOT~000/ DirectoryIntroductionSep 4, 2024A response icon2Sep 4, 2024A response icon2
Discovering a Sigma SQLi Vulnerability in Explore CMS 1.0Hello everyone, my name is SoltnAli. Today, I want to share an exciting discovery I made while working on Explore CMS 1.0. As someone who…Jul 8, 2024A response icon3Jul 8, 2024A response icon3