logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
  • The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • Software rollout failure led to Devon & Cornwall cops recording zero crime for 3 months

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2933 (chrome) 30 May 2023
  • CVE-2023-2934 (chrome) 30 May 2023
  • CVE-2023-2941 (chrome) 30 May 2023
  • CVE-2023-2932 (chrome) 30 May 2023
  • CVE-2023-2936 (chrome) 30 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner

Posted on 20 July 2020

From kalilinuxtutorials.com

CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner
  • Reflect Origin checks
  • Prefix Match
  • Suffix Match
  • Not Esacped Dots
  • Null
  • ThirdParties (Like => github.io, repl.it etc.)
    • Taken from Chenjj’s github repo
  • SpecialChars (Like => “}”,”(“, etc.)
    • See more in Advanced CORS Exploitation Techniques

Read more…

Posted in News

Post navigation

Previous post: BadPower attack corrupts fast chargers to melt or set your device on fire
Next post: FastWind ransomware is the files virus that relies on encrypting data, so money can be demanded from you directly
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.