Sept. 27, 2023, 10:35 a.m. | Gowthamaraj Rajendran (@fuffsec)

System Weakness - Medium systemweakness.com

Source

Vulnerabilities within XML parsing can act as the exploitation point for many systems. Combined, they can lead to severe consequences, including data leaks, SSRF, service disruptions, and even remote command or code execution.

Introduction to XML

This post aims to explain the syntax and concepts of XML entities, which could be used as potential cyber attack vectors if not understood completely.

XML combines markup and content, using tags as its primary form of markup to structure and validate data …

ctf owasp security web security xxe

Director, Cyber Risk

@ Kroll | South Africa

Security Engineer, XRM

@ Meta | New York City

Security Analyst 3

@ Oracle | Romania

Internship - Cyber Security Operations

@ SES | Betzdorf, LU

Principal Product Manager (Network/Security Management) - NetSec

@ Palo Alto Networks | Bengaluru, India

IT Security Engineer

@ Timocom GmbH | Erkrath, Germany