pin Sex discrimination cooperate ruby deserialization exploit session fellowship suddenly
Zero Day Initiative — Remote Code Execution via Ruby on Rails Active Storage Insecure Deserialization
🔎Exploring de-serialization issues in Ruby projects.
GitHub - j4k0m/Ruby2.x-RCE-Deserialization: Code execution by using a Ruby Universal Gadget when an attacker controls the data passed to Marshal.load().
GitHub - mpgn/Rails-doubletap-RCE: RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)
Exploiting Node.js deserialization bug for Remote Code Execution | OpSecX
Discovering Deserialization Gadget Chains in Rubyland - Include Security Research Blog
Insecure De-serialization. Serialization is the process of… | by Jay Wandery | Medium
Data Deserialization
Zero Day Initiative — Remote Code Execution via Ruby on Rails Active Storage Insecure Deserialization
Insecure Deserialization: It's super hard! Or is it? | by Thexssrat | InfoSec Write-ups
Unsafe Deserialization Vulnerability | SecureFlag Security Knowledge Base
Identifying and Exploiting Unsafe Deserialization in Ruby | by Plenum | InfoSec Write-ups