SSRF | Reading Local Files from DownNotifier server
https://www.openbugbounty.org/blog/leonmugen/ssrf-reading-local-files-from-downnotifier-server/
https://www.openbugbounty.org/blog/leonmugen/ssrf-reading-local-files-from-downnotifier-server/
Information Disclosure through Sentry Instance ███████
https://hackerone.com/reports/697512
https://hackerone.com/reports/697512
HackerOne
Zomato disclosed on HackerOne: Information Disclosure through...
Hello team
I found a bug (sensitive information ) can be used from attackers to perfom attack in youre server
I don't know if this in scope so i'm sorry if i'm wrrong
withou spending youre...
I found a bug (sensitive information ) can be used from attackers to perfom attack in youre server
I don't know if this in scope so i'm sorry if i'm wrrong
withou spending youre...
Add and Access to Labels of any Private Projects/Groups of Gitlab(IDOR)
https://hackerone.com/reports/439729
https://hackerone.com/reports/439729
HackerOne
GitLab disclosed on HackerOne: Add and Access to Labels of any...
**Summary & Denoscription :
If you have a private project or private group then no non member should be able to access any information.But Adding Labels in your Private boards API request is...
If you have a private project or private group then no non member should be able to access any information.But Adding Labels in your Private boards API request is...
JetBrains .idea project directory
https://hackerone.com/reports/80990
https://hackerone.com/reports/80990
HackerOne
Ubiquiti Inc. disclosed on HackerOne: JetBrains .idea project...
Vulnerability denoscription
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core to the project itself, such as names...
The .idea directory contains a set of configuration files (.xml) for your project. These configuration files contain information core to the project itself, such as names...
DoS through PeerExplorer
https://hackerone.com/reports/363636
https://hackerone.com/reports/363636
HackerOne
Rootstock Labs disclosed on HackerOne: DoS through PeerExplorer
**Summary:** The peer discovery implementation is vulnerable to a Denial of Service attack due to improper management of connections.
**Denoscription:** The two main files of interest in detailing...
**Denoscription:** The two main files of interest in detailing...
Reversing HackEx - An android game https://0x00sec.org/t/reversing-hackex-an-android-game/16243
0x00sec - The Home of the Hacker
Reversing HackEx - An android game
Hello peeps. I’m sp0re. This is my first post on 0x00sec, you can find more about me on my website. Today we are going to reverse engineer the network protocol of an android game so that we can automate the game, and earn unlimited money while drinking sodas…
Meet our hackers – Borja https://yogosha.com/2019/09/20/meet-our-hackers-borja/
Adventures with Facebook’s session cookie
https://medium.com/@JSSaini07/adventures-with-facebooks-session-cookie-3a6e10783070
https://medium.com/@JSSaini07/adventures-with-facebooks-session-cookie-3a6e10783070
Medium
Adventures with Facebook’s session cookie
As we all know, our session information is stored in the cookies 🍪 . Let’s begin by taking a look at what cookies are stored by facebook…
Stored XSS on Zendesk via Macro’s PART 2
https://medium.com/@hariharan21/stored-xss-on-zendesk-via-macros-part-2-676cefee4616
https://medium.com/@hariharan21/stored-xss-on-zendesk-via-macros-part-2-676cefee4616
Medium
Stored XSS on Zendesk via Macro’s PART 2
Hi Guys,
Razer started using Hacker0x01 today: hackerone.com/razer , pays: 100$ min
What happens if we use our brain's 100% capacity
Via: https://twitter.com/cyanpiny/status/1175030939891712000
Via: https://twitter.com/cyanpiny/status/1175030939891712000
Heap overflow happen when receiving short length key from ssh server using ssh protocol 1
https://hackerone.com/reports/630462
https://hackerone.com/reports/630462
HackerOne
PuTTY (European Commission - DIGIT) disclosed on HackerOne: Heap...
## Summary:
There's no check in `ssh1_login_process_queue` function when read `servkey` and `hostkey` length from packet which may cause heap overflow.
Remote code execution may be possible.
##...
There's no check in `ssh1_login_process_queue` function when read `servkey` and `hostkey` length from packet which may cause heap overflow.
Remote code execution may be possible.
##...
A Simple bypass of Registration Activation that Lead to many Bug -
https://medium.com/bugbountywriteup/a-simple-bypass-of-registration-activation-that-lead-to-many-bug-a-story-about-how-my-friend-5df0889f1062
https://medium.com/bugbountywriteup/a-simple-bypass-of-registration-activation-that-lead-to-many-bug-a-story-about-how-my-friend-5df0889f1062
Bug or Feature? GitHub Adventure #001
https://medium.com/oad-earth/bug-or-feature-github-adventure-001-eae9bea48ae8
https://medium.com/oad-earth/bug-or-feature-github-adventure-001-eae9bea48ae8
Medium
Bug or Feature? GitHub Adventure #001
Is OAuth GitHub really safe?
A Simple bypass of Registration Activation that Lead to many Bug
https://medium.com/bugbountywriteup/a-simple-bypass-of-registration-activation-that-lead-to-many-bug-a-story-about-how-my-friend-5df0889f1062
https://medium.com/bugbountywriteup/a-simple-bypass-of-registration-activation-that-lead-to-many-bug-a-story-about-how-my-friend-5df0889f1062
Facebook Workplace Privilege Escalation Vulnerability To Change The Post Privacy As Public
https://medium.com/@guhanraja/facebook-workplace-privilege-escalation-vulnerability-to-change-the-post-privacy-as-public-634f1c995780
https://medium.com/@guhanraja/facebook-workplace-privilege-escalation-vulnerability-to-change-the-post-privacy-as-public-634f1c995780
Medium
Facebook Workplace Privilege Escalation Vulnerability To Change The Post Privacy As Public
Hi hello everyone, This is Guhan Raja
Exploiting Cookie Based XSS by Finding RCE
https://medium.com/@mastomi/bug-bounty-exploiting-cookie-based-xss-by-finding-rce-a3e3e80041f3
https://medium.com/@mastomi/bug-bounty-exploiting-cookie-based-xss-by-finding-rce-a3e3e80041f3
Medium
[Bug Bounty] Exploiting Cookie Based XSS by Finding RCE
When doing penetrating on this target, I collaborated with YoKo Kho to get the highest privileges. In this paper you may find a little…
Forwarded from Android Security & Malware
MobSF v2.0 released
https://github.com/MobSF/Mobile-Security-Framework-MobSF
https://github.com/MobSF/Mobile-Security-Framework-MobSF
GitHub
GitHub - MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application…
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a...
WordPress Privilege Escalation from an Editor to Administrator
https://stazot.tk/wordpress-privilege-escalation-from-an-editor-to-administrator
https://stazot.tk/wordpress-privilege-escalation-from-an-editor-to-administrator
Broken Link Hijacking - s3 buckets
https://tutorgeeks.blogspot.com/2019/09/broken-link-hijacking-s3-buckets.html
https://tutorgeeks.blogspot.com/2019/09/broken-link-hijacking-s3-buckets.html
Blogspot
Broken Link Hijacking - s3 buckets
Tutorgeeks hackerone bugcrowd proof of concept cobalt vulnerabilities bug bounty security penetration testing technology evangelist red team synack