Tagged articles
5 articles
Page 1 of 1
Black & White Path
Black & White Path
Feb 14, 2026 · Information Security

How I Uncovered Critical Vulnerabilities in an EDU Certificate Site

The author details a step‑by‑step security assessment of an EDU certificate platform, revealing edge asset discovery, unauthorized .map file leakage, arbitrary file download and upload, path‑traversal flaws, and credential exposure via Bash history, culminating in high‑severity findings.

EDU certificate siteInformation Securityarbitrary file upload
0 likes · 5 min read
How I Uncovered Critical Vulnerabilities in an EDU Certificate Site
IT Services Circle
IT Services Circle
Sep 29, 2025 · Backend Development

How Go’s New os.Root API Stops Path Traversal Attacks

This article explains the severe risks of file‑path traversal attacks in Go applications, reviews common exploitation techniques, evaluates existing mitigation methods, and demonstrates how the newly introduced os.Root API provides a robust, native solution for securely handling user‑supplied file paths.

file-handlingos.Rootpath traversal
0 likes · 15 min read
How Go’s New os.Root API Stops Path Traversal Attacks
Laravel Tech Community
Laravel Tech Community
Sep 20, 2022 · Information Security

Path Traversal Vulnerability in Go net/url (CVE-2022-32190)

The Go net/url package contains a path traversal flaw (CVE-2022-32190) where JoinPath fails to strip "../" segments, allowing attackers to access sensitive files, affecting versions prior to 1.18.6 and 1.19.1, and can be mitigated by upgrading to the patched releases.

CVE-2022-32190Vulnerabilitynet/url
0 likes · 3 min read
Path Traversal Vulnerability in Go net/url (CVE-2022-32190)
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

How Attackers Exploit Directory Traversal and How to Defend Against It

This article explains what directory (path) traversal is, demonstrates how attackers can read or write arbitrary files on a server by manipulating file‑path parameters, outlines common bypass techniques, and provides concrete defensive coding practices to mitigate the vulnerability.

VulnerabilityWeb Securitydefense
0 likes · 6 min read
How Attackers Exploit Directory Traversal and How to Defend Against It