<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Writeups on SpiizN's Blog</title><link>https://blog.spiizn.xyz/categories/writeups/</link><description>Recent content in Writeups on SpiizN's Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 06 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.spiizn.xyz/categories/writeups/index.xml" rel="self" type="application/rss+xml"/><item><title>FCSC 2026 – Shrimp Saver</title><link>https://blog.spiizn.xyz/writeups/fcsc-2026-shrimp-saver/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.spiizn.xyz/writeups/fcsc-2026-shrimp-saver/</guid><description>TL;DR: XSS via HTML entity double-parse and CSP bypass via PHP warning</description></item><item><title>FCSC 2026 – FCSC Aquarium</title><link>https://blog.spiizn.xyz/writeups/fcsc-2026-fcsc-aquarium/</link><pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.spiizn.xyz/writeups/fcsc-2026-fcsc-aquarium/</guid><description>TL;DR: RCE via data: URI injection in import() and node permission bypass via inspector API</description></item><item><title>FCSC 2026 – Bubulle Corp (Part 1/2)</title><link>https://blog.spiizn.xyz/writeups/fcsc-2026-bubulle-corp-part1/</link><pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.spiizn.xyz/writeups/fcsc-2026-bubulle-corp-part1/</guid><description>TL;DR: SSRF by bypassing the https:// scheme filter through an XML parsing discrepancy</description></item><item><title>FCSC 2026 – Shellfish Say</title><link>https://blog.spiizn.xyz/writeups/fcsc-2026-shellfish-say/</link><pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate><guid>https://blog.spiizn.xyz/writeups/fcsc-2026-shellfish-say/</guid><description>TL;DR: XSS via path traversal chained with arbitrary file write through PHP session upload progress</description></item></channel></rss>