BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
362
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://labs.watchtowr.com/get-fortirekt-i-am-the-super_admin-now-fortios-authentication-bypass-cve-2024-55591/
watchTowr Labs
Get FortiRekt, I Am The Super_Admin Now - Fortinet FortiOS Authentication Bypass CVE-2024-55591
Welcome to Monday, and what an excitingly fresh start to the week we're all having.
Grab your coffee, grab your vodka - we're diving into a currently exploited-in-the-wild critical Authentication Bypass affecting foRtinet's (we are returning the misspelling…
❤
1
BugBounty & Hacking Resources
https://jub0bs.com/posts/2025-01-28-programmatic-handling-of-cors-configuration-errors/
Jub0Bs
Programmatic handling of CORS-configuration errors with jub0bs/cors
TL;DR ¶ jub0bs/cors v0.5.0 now lets you handle CORS-configuration errors programmatically. This feature should be of interest to you if you’re a multi-tenant service provider and you let your tenants configure CORS for their instances. jub0bs/cors’s commitment…
❤
1
BugBounty & Hacking Resources
https://portswigger.net/research/bypassing-character-blocklists-with-unicode-overflows
PortSwigger Research
Bypassing character blocklists with unicode overflows
Unicode codepoint truncation - also called a Unicode overflow attack - happens when a server tries to store a Unicode character in a single byte. Because the maximum value of a byte is 255, an overflo
❤
1
👍
1
👌
1
BugBounty & Hacking Resources
https://www.pmnh.site/post/writeup_spring_el_waf_bypass/
www.pmnh.site
Bug Writeup: RCE via SSTI on Spring Boot Error Page with Akamai WAF Bypass
Writeup of a collaborated bug on Bugcrowd where I was able to bypass Akamai WAF to exploit RCE on Spring Boot error page using SpEL
❤
1
BugBounty & Hacking Resources
https://rhinosecuritylabs.com/research/cve-2024-46507-yeti-server-side-template-injection-ssti/
Rhino Security Labs
CVE-2024-46507: Yeti Platform Server-Side Template Injection (SSTI)
Yeti is a Forensic Intelligence platform and pipeline for DFIR teams. Rhino Security Labs will detail 2 security flaws that, combined, lead to unauthenticated RCE.
❤
1
BugBounty & Hacking Resources
https://blog.talosintelligence.com/whatsup-gold-observium-offis-vulnerabilities/
Cisco Talos Blog
Whatsup Gold, Observium and Offis vulnerabilities
Cisco Talos’ Vulnerability Research team recently disclosed three vulnerabilities in Observium, three vulnerabilities in Offis, and four vulnerabilities in Whatsup Gold.
These vulnerabilities exist in Observium, a network observation and monitoring system;…
❤
1
BugBounty & Hacking Resources
https://x.com/galnagli/status/1884720268150468825?s=52&t=3ollaK32Y-Nt-7OjeC-Mjw
X (formerly Twitter)
Nagli (@galnagli) on X
Critical vulnerabilities doesn't have to be complex or have a CVE - @deepseek_ai publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.
No one is safe from security mistakes, follow…
👍
3
❤
1
BugBounty & Hacking Resources
https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html
❤
3
🔥
2
BugBounty & Hacking Resources
https://googleprojectzero.blogspot.com/2025/01/windows-bug-class-accessing-trapped-com.html
Blogspot
Windows Bug Class: Accessing Trapped COM Objects with IDispatch
Posted by James Forshaw, Google Project Zero Object orientated remoting technologies such as DCOM and .NET Remoting make it very easy ...
❤
2
BugBounty & Hacking Resources
https://googleprojectzero.blogspot.com/2025/01/windows-exploitation-tricks-trapping.html
Blogspot
Windows Exploitation Tricks: Trapping Virtual Memory Access (2025 Update)
Posted by James Forshaw, Google Project Zero Back in 2021 I wrote a blog post about various ways you can build a virtual memory acces...
🔥
2
BugBounty & Hacking Resources
https://starlabs.sg/blog/2025/12-mali-cious-intent-exploiting-gpu-vulnerabilities-cve-2022-22706/
STAR Labs
Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)
Imagine downloading a game from a third-party app store. You grant it seemingly innocuous permissions, but hidden within the app is a malicious exploit that allows attackers to steal your photos, eavesdrop on your conversations, or even take complete control…
2
BugBounty & Hacking Resources
https://jprx.io/cve-2025-24118/
jprx.io
CVE-2025-24118 Writeup
A crazy race condition in the XNU kernel.
🔥
2
BugBounty & Hacking Resources
https://connormcgarr.github.io/km-shadow-stacks/
Connor McGarr’s Blog
Exploit Development: Investigating Kernel Mode Shadow Stacks on Windows
Using SourcePoint’s JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
2
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w
GitHub
AMD: Microcode Signature Verification Vulnerability
### Summary
Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...
2
BugBounty & Hacking Resources
https://dustri.org/b/serving-a-gzip-bomb-with-caddy.html
www.dustri.org
Serving a (g)zip bomb with Caddy
Personal blog of Julien (jvoisin) Voisin
❤
1
BugBounty & Hacking Resources
https://labs.watchtowr.com/8-million-requests-later-we-made-the-solarwinds-supply-chain-attack-look-amateur/
watchTowr Labs
8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur
Surprise surprise, we've done it again. We've demonstrated an ability to compromise significantly sensitive networks, including governments, militaries, space agencies, cyber security companies, supply chains, software development systems and environments…
❤
1
BugBounty & Hacking Resources
https://portswigger.net/research/top-10-web-hacking-techniques-of-2024
PortSwigger Research
Top 10 web hacking techniques of 2024
Welcome to the Top 10 Web Hacking Techniques of 2024, the 18th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
❤
4
BugBounty & Hacking Resources
https://blog.slonser.info/posts/why-protocol-matters/
blog.slonser.info
Why Protocol Matters: Evil PWA Attack on Casdoor
The article is informative and intended for security specialists conducting testing within the scope of a contract. The author is not responsible for any damage caused by the application of the provided information. The distribution of malicious programs…
❤
1
BugBounty & Hacking Resources
https://github.blog/security/vulnerability-research/cybersecurity-researchers-digital-detectives-in-a-connected-world/
The GitHub Blog
Cybersecurity researchers: Digital detectives in a connected world
Discover the exciting world of cybersecurity research: what researchers do, essential skills, and actionable steps to begin your journey toward protecting the digital world.
❤
1
BugBounty & Hacking Resources
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112
❤
1
BugBounty & Hacking Resources
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2110
❤
1
TWeb.init({scrollToPost:'projectzeroTM/234'});