- Converting string to enum at the cost of 50 GB: let’s analyze the CVE-2020–36620 vulnerability https://sergvasiliev.medium.com/converting-string-to-enum-at-the-cost-of-50-gb-lets-analyze-the-cve-2020-36620-vulnerability-e8ce73c87cd7?sk=9a6e402afde9c6ea3494ab4dbb73ae70&source=friends_link 3 comments programming
- .NET 7: suspicious places and errors in the source code https://sergvasiliev.medium.com/net-7-suspicious-places-and-errors-in-the-source-code-34dfa107a9c9?sk=86538ebe0f8079669595ace3731726cb&source=friends_link 12 comments dotnet
- Vulnerabilities due to XML files processing: XXE in C# applications in theory and in practice https://sergvasiliev.medium.com/vulnerabilities-due-to-xml-files-processing-xxe-in-c-applications-in-theory-and-in-practice-f94912216093?source=friends_link&sk=860975347644b934f8c574420fe45d28 4 comments programming
- How Visual Studio 2022 ate up 100 GB of memory and what XML bombs had to do with it https://sergvasiliev.medium.com/how-visual-studio-2022-ate-up-100-gb-of-memory-and-what-xml-bombs-had-to-do-with-it-3a92ed11c6cb?source=friends_link&sk=0bcfa0884a1fedb51796196758e393cc 29 comments programming