Blind IDOR in LinkedIn iOS application
https://hailstorm1422.com/linkedin-blind-idor/
https://hailstorm1422.com/linkedin-blind-idor/
CVE-2020-5842 Stored XSS Vulnerability in Codoforum 4.8.3
https://medium.com/@prasanthc41m/cve-2020-5842-stored-xss-vulnerability-in-codoforum-4-8-3-b2e1133c6a91
https://medium.com/@prasanthc41m/cve-2020-5842-stored-xss-vulnerability-in-codoforum-4-8-3-b2e1133c6a91
Medium
CVE-2020-5842 Stored XSS Vulnerability in Codoforum 4.8.3
Happy New Year 2020!!!
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
https://medium.com/@raushanraj_65039/adding-a-malicious-notebook-to-be-treated-like-a-trusted-notebook-in-google-colab-1337-b84353a9f77
Medium
Adding a malicious notebook to be treated like a trusted notebook in Google Colab — 1337$
Introduction
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care https://medium.com/@ozguralp/unauthorized-google-maps-api-key-usage-cases-and-why-you-need-to-care-1ccb28bf21e
Medium
Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care
For the ones who do not have any information about this service and its API Key’s, Google Maps API is a paid service which allows…
Simple Remote Code Execution Vulnerability Examples for Beginners
https://medium.com/@ozguralp/simple-remote-code-execution-vulnerability-examples-for-beginners-985867878311
https://medium.com/@ozguralp/simple-remote-code-execution-vulnerability-examples-for-beginners-985867878311
Medium
Simple Remote Code Execution Vulnerability Examples for Beginners
Especially when I talk with newbie security researchers/bug bounty hunters, they always make me feel as not thinking theirselves capable…
How to Use OWASP Amass: An Extensive Tutorial https://www.dionach.com/blog/how-to-use-owasp-amass-an-extensive-tutorial/
Multiple Host Header Attacks after bypassing protection with… a Header Attack https://0x00sec.org/t/multiple-host-header-attacks-after-bypassing-protection-with-a-header-attack/18018
0x00sec - The Home of the Hacker
Multiple Host Header Attacks after bypassing protection with... a Header Attack
I was searching for bug bounty programmes by using google dorks, when I came across one by a company, let’s say, Example Inc. They had a ,relatively, big scope and I thought I’d give that a try. After doing some recon and finding some interesting domains…