![](https://cdn.invicti.com/app/uploads/2024/11/05092006/security-labs-13-300x150.jpg)
Articles by Sven Morgenroth
![](https://cdn.invicti.com/app/uploads/2024/11/05092006/security-labs-13-300x150.jpg)
![](https://cdn.invicti.com/app/uploads/2024/05/23100810/blog-image-21-300x152.jpeg)
How bad is a missing Content-Type header?
![](https://cdn.invicti.com/app/uploads/2022/06/28120011/ns-vulnerabilities-attacks-technical-seo-posts2-1200x630-300x158.png)
APIs make XSS prevention a frontend job
![](https://cdn.invicti.com/app/uploads/2022/06/12133009/AppSec-with-Zero-Noise-768x384-1-300x150.png)
Extracting data from insecure Elasticsearch templates
![](https://cdn.invicti.com/app/uploads/2022/06/28120618/oracle-weblogic-vulnerability-analysis-300x158.png)
Analysis of the recent Oracle WebLogic Server remote code execution vulnerability
![](https://cdn.invicti.com/app/uploads/2022/06/28120703/react-cross-site-scripting-300x158.png)
Cross-site Scripting in React Web Applications
![](https://cdn.invicti.com/app/uploads/2022/06/28121117/goodbye-xss-auditor-300x158.png)
Goodbye XSS Auditor
![](https://cdn.invicti.com/app/uploads/2022/06/28121132/string-concatenation-format-string-vulnerabilities-300x158.jpg)
The Problem of String Concatenation and Format String Vulnerabilities
![](https://cdn.invicti.com/app/uploads/2022/06/28121332/Using-the-DNS-as-a-File-System-300x158.jpg)
DNSFS: Is it possible to use DNS as a file system?
![](https://cdn.invicti.com/app/uploads/2022/06/28121346/Hacking-iot-devices-using-web-based-attacks-300x158.jpg)
Discovering and hacking IoT devices using web-based attacks
![](https://cdn.invicti.com/app/uploads/2022/06/28121348/Bypass-disabled-system-functions-300x158.png)
Bypassing disabled system functions
![](https://cdn.invicti.com/app/uploads/2022/06/28121359/Using-Google-Bots-as-an-Attack-Vector-300x158.png)