Date Published: April 2025Author: PinewoodSec Research Team Introduction On March 10, 2025, the Apache Software Foundation issued a security advisory for CVE-2025-24813—a critical vulnerability in A...
Understanding the Security Implications of Internal Headers Today, we’re examining CVE-2025-29927, a critical security vulnerability affecting Next.js middleware that could allow attackers to by...
Local File Inclusion (LFI) Vulnerability Full Attack Demo and Source Code Analysis For PinewoodStore
📌 This blog is about Local File Inclusion (LFI), how attackers exploit it to gain access to sensitive files, and how developers can secure their code against this vulnerability. We will analyze a r...
In this blog we are going to discuss Server-Side Request Forgery (SSRF) and demo how the exploitation is carried out on the vulnerable web application called PinewoodStore. We would also analyze the v...
In this blog we would discuss about XML External Entity (XXE) vulnerability and i would demo the full exploitation process on vulnerable site I created called PinewoodStore. XML External Entity (XXE) ...
Hello everyone, Today we would be discussing about Stored XSS and how this vulnerability is exploited by bad actors. We would also analyze vulnerable source code from PinewoodStore, a Vulnerable Web I...
I have created vulnerable web application using Front end react and backend spring boot. This test application web application is called PinewoodStore. Some of the vulnerabilities that have been intro...
As part of source code analysis lab i was researching to see what ChatGPT offers as compliant source code to some of the well known vulnerabilities. The one i was researching was about creating an app...
I am expanding on the third person shooter hacking game created with Unreal Engine. I have given it the name “DOOMSDAY HACKERS”. The gameplay for the LEVEL 2 challenge involves eliminating...
How the Idea came along to Design a Hacking Game ? As a cybersecurity professional we all had to keep ourselves updated with latest hacking trends whether to use it in Penetration testing job role or ...