Bug Bounty
@Bug0x
5.5K
subscribers
14
photos
134
links
@HackerOne
Admin :
@Offensive
Download Telegram
Join
Bug Bounty
5.5K subscribers
Bug Bounty
https://www.youtube.com/watch?v=xrcat_U098w
Bug Bounty
https://hackerone.com/reports/398641
HackerOne
DuckDuckGo disclosed on HackerOne: SSRF on duckduckgo.com/iu/
Normally, a call to `https://duckduckgo.com/iu` contains a query parameter (`u`) with some path using the domain `yimg.com`. This call will succeed in most cases.
{F337121}
And if we change that...
Bug Bounty
http://omespino.com/write-up-lovestory-from-closed-as-informative-to-xx00-usd-in-yahoo-ios-mail-app/
Bug Bounty
https://blog.harshjaiswal.com/path-traversal-while-uploading-results-in-rce
Bug Bounty
https://medium.com/@Skylinearafat/a-very-useful-technique-to-bypass-the-csrf-protection-for-fun-and-profit-471af64da276
Medium
A very useful technique to bypass the CSRF protection for fun and profit.
Hi folks, It’s always pleasure to share some good stuff with you guys. The heading of the story may give you an idea that today I’m going…
Bug Bounty
https://www.youtube.com/watch?v=iSDoUGjfW3Q
YouTube
BSidesMCR 2018: Practical Web Cache Poisoning: Redefining 'Unexploitable' by James Kettle
Bug Bounty
https://www.secjuice.com/php-rce-bypass-filters-sanitization-waf/
Bug Bounty
https://shenaniganslabs.io/2019/02/13/Dirty-Sock.html
Shenanigans Labs
Privilege Escalation in Ubuntu Linux (dirty_sock exploit)
In January 2019, I discovered a privilege escalation vulnerability in default installations of Ubuntu Linux. This was due to a bug in the snapd API, a default service. Any local user could exploit this vulnerability to obtain immediate root access to the…
Bug Bounty
https://ysamm.com/?p=185
Bug Bounty
https://blog.websecurify.com/2017/02/hacking-json-web-tokens.html
Bug Bounty
https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
Bug Bounty
https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/
Auth0 - Blog
Critical vulnerabilities in JSON Web Token libraries
Which libraries are vulnerable to attacks and how to prevent them.
Bug Bounty
https://generaleg0x01.com/2019/03/10/escalating-ssrf-to-rce/
Bug Bounty
https://medium.com/@armaanpathan/brute-forcing-user-ids-via-csrf-to-delete-all-users-with-csrf-attack-216ccd4d832c
Medium
Brute Forcing User IDS via CSRF To Delete all Users with CSRF attack.
While testing an application, there was a module “Delete User” in which an admin can delete any user.
Bug Bounty
https://hackerone.com/reports/470520
HackerOne
Valve disclosed on HackerOne: RCE on Steam Client via buffer...
## Introduction
In Steam and other valve games (CSGO, Half-Life, TF2) there is a functionality to find game servers called the server browser. In order to retrieve the information about these...
Bug Bounty
https://blog.redforce.io/sql-injection-in-insert-update-query-without-comma/
Redforce
Comma is forbidden! No worries!! Inject in insert/update queries without it
A writeup regarding exploiting SQL injection issue in an insert query while it wasn't possible to use a comma at my payload at all.
Bug Bounty
https://medium.com/@valeriyshevchenko/critical-vulnerabilities-in-pulse-secure-and-fortinet-ssl-vpns-in-the-wild-internet-3991ea9e6481
Medium
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Infiltrating Corporate Intranet like Banks, Governments, Airports became possible with vulnerable SSL VPN clients.
Bug Bounty
https://hackerone.com/reports/549040
HackerOne
GitLab disclosed on HackerOne: Clientside resource Exhausting by...
### Summary
based on the documentation gitlab markdown is supporting math expresion rendering using `KaTex` and able to run subset syntax from `LaTex` this could be achieved by using 2 ways in the...
Bug Bounty
https://medium.com/bugbountywriteup/reflected-dom-xss-and-clickjacking-on-https-silvergoldbull-de-bt-html-daa36bdf7bf0
Medium
Reflected DOM XSS and CLICKJACKING on https://silvergoldbull.de/bt.html
While doing spidering on silvergoldbull site I noticed a strange request to https://silvergoldbull.de/bt.html with following request:
Bug Bounty
https://medium.com/@shahjerry33/mail-server-misconfiguration-f42734d19678
Medium
Mail Server Misconfiguration
Summary :
Bug Bounty
https://medium.com/@vbharad/account-takeover-through-password-reset-poisoning-72989a8bb8ea
Medium
Account Takeover Through Password Reset Poisoning
Introduction :
TWeb.init({scrollToPost:'Bug0x/49'});