Bug Bounty
@Bug0x
5.5K
subscribers
14
photos
134
links
@HackerOne
Admin :
@Offensive
Download Telegram
Join
Bug Bounty
5.5K subscribers
Bug Bounty
https://blog.redforce.io/sql-injection-in-insert-update-query-without-comma/
Redforce
Comma is forbidden! No worries!! Inject in insert/update queries without it
A writeup regarding exploiting SQL injection issue in an insert query while it wasn't possible to use a comma at my payload at all.
Bug Bounty
https://medium.com/@valeriyshevchenko/critical-vulnerabilities-in-pulse-secure-and-fortinet-ssl-vpns-in-the-wild-internet-3991ea9e6481
Medium
Critical vulnerabilities in Pulse Secure and Fortinet SSL VPNs in the Wild Internet
Infiltrating Corporate Intranet like Banks, Governments, Airports became possible with vulnerable SSL VPN clients.
Bug Bounty
https://hackerone.com/reports/549040
HackerOne
GitLab disclosed on HackerOne: Clientside resource Exhausting by...
### Summary
based on the documentation gitlab markdown is supporting math expresion rendering using `KaTex` and able to run subset syntax from `LaTex` this could be achieved by using 2 ways in the...
Bug Bounty
https://medium.com/bugbountywriteup/reflected-dom-xss-and-clickjacking-on-https-silvergoldbull-de-bt-html-daa36bdf7bf0
Medium
Reflected DOM XSS and CLICKJACKING on https://silvergoldbull.de/bt.html
While doing spidering on silvergoldbull site I noticed a strange request to https://silvergoldbull.de/bt.html with following request:
Bug Bounty
https://medium.com/@shahjerry33/mail-server-misconfiguration-f42734d19678
Medium
Mail Server Misconfiguration
Summary :
Bug Bounty
https://medium.com/@vbharad/account-takeover-through-password-reset-poisoning-72989a8bb8ea
Medium
Account Takeover Through Password Reset Poisoning
Introduction :
Bug Bounty
https://medium.com/bugbountywriteup/devoops-an-xml-external-entity-xxe-hackthebox-walkthrough-fb5ba03aaaa2
Medium
DevOops — An XML External Entity (XXE) HackTheBox Walkthrough
Summary
Bug Bounty
https://hailstorm1422.com/linkedin-blind-idor/
Bug Bounty
https://bugs.xdavidhu.me/google/2020/03/08/the-unexpected-google-wide-domain-check-bypass/
bugs.xdavidhu.me
The unexpected Google wide domain check bypass
David Schütz's bug bounty writeups
Bug Bounty
https://medium.com/@s3c/how-i-hacked-worldwide-zoom-users-eafdff94077d
Bug Bounty
https://medium.com/bugbountywriteup/bounty-tip-easiest-way-to-bypass-apis-rate-limit-f984fad40093
Medium
Bounty Tip !! Easiest way to bypass API’s Rate Limit.
What is Rate Limit ?
Bug Bounty
https://medium.com/bugbountywriteup/bounty-tip-easiest-way-to-bypass-apis-rate-limit-f984fad40093
Medium
Bounty Tip !! Easiest way to bypass API’s Rate Limit.
What is Rate Limit ?
Bug Bounty
https://hackerone.com/reports/320355
HackerOne
Shopify disclosed on HackerOne: myshopify.com domain takeover
On February 27, 2018, Shopify support received notification that `myshopify.com` was being redirected to a specific Shopify store. We tracked the behaviour down to tests from @0xacb. Unknowingly,...
Bug Bounty
https://hackerone.com/reports/827052
HackerOne
GitLab disclosed on HackerOne: Arbitrary file read via the...
### Summary
The `UploadsRewriter` does not validate the file name, allowing arbitrary files to be copied via directory traversal when moving an issue to a new project.
The pattern used to look for...
Bug Bounty
https://hackerone.com/reports/506646
HackerOne
Starbucks disclosed on HackerOne: Webshell via File Upload on...
johnstone discovered An arbitrary file upload via the resume functionality at https://ecjobs.starbucks.com.cn which led to arbitrary code execution by uploading a webshell.
@johnstone — thank for...
Bug Bounty
https://hackerone.com/reports/429000
HackerOne
U.S. Dept Of Defense disclosed on HackerOne: Access to all...
**Summary:**
Due to an Insecure Direct Object Reference (IDOR) in adding recipients to a shared package on ██████████, an unauthenticated attacker can access all files uploaded to ████. As...
Bug Bounty
https://hackerone.com/reports/237381
Bug Bounty
Forwarded from
HackerOne
(
Amir Kiani
)
Core Impact 19.1 with unlimited license with April updates. Bonus 3rd party Core tools. 5000$
@neoleadS
Bug Bounty
Forwarded from
HackerOne
(
Amir Kiani
)
TWeb.init({scrollToPost:'Bug0x/64'});