MORE FROM THIS AUTHOR
How Netsparker Hawk Finds SSRF and Out-of-Band Vulnerabilities
This article explains in detail how the Netsparker web application security scanner uses the Netsparker Hawk vulnerability testing infrastructure to identify Server Side Request Forgery, blind, async and second order web application vulnerabilities.
Identifying WordPress Websites On Local Networks (behind Firewalls) and Bruteforcing the Login Pages
This article explains how attackers can use the XSHM attack to identify WordPress websites running on internal networks and behind firewalls, and also launch a login bruteforce attack against them.
Remote Code Evaluation (Execution) Vulnerability
This article explains what the Remote Code Evaluation (execution) vulnerability is and how attackers can exploit it. The article also explains of what you should do as a developer to prevent this vulnerability.