Category: Mix

Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library
12
Mar
2023

Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library

Overview On August 24th, 2022, we reported a vulnerability to Netlify affecting their Next.js “netlify-ipx” repository which would allow an…

ropnop blog
12
Mar
2023

ChiBrrCon 2020: Don’t Cross Me! Same Origin Policy and all the “cross” vulns

ChiBrrCon 2020: Don’t Cross Me! Same Origin Policy and all the “cross” vulns Source link

[Google VRP] SSRF in Google Cloud Platform StackDriver – Ron Chan
12
Mar
2023

[Google VRP] SSRF in Google Cloud Platform StackDriver – Ron Chan

During the process of testing GAE after reading this awesome blog post, I found a debug application in Google Cloud…

FROM 0 to $$$$ - MY BIGGEST BUG BOUNTY LEARNINGS!
12
Mar
2023

FROM 0 to $$$$ – MY BIGGEST BUG BOUNTY LEARNINGS!

FROM 0 to $$$$ – MY BIGGEST BUG BOUNTY LEARNINGS! Source link

Bountycon2020 Presentation | Richard’s Infosec blog
12
Mar
2023

Bountycon2020 Presentation | Richard’s Infosec blog

I was recently invited to present at BountyCon 2020. This was supposed to early March in Singapore where flights and…

How to Spend Time Well, A Framework · rez0
12
Mar
2023

How to Spend Time Well, A Framework · rez0

For a healthy person in a first world country, the number of things we could do is near infinite. And…

Include This In Your Hacking Workflow by Continuous Monitoring with AuthoGraphQL (How-to guide)
12
Mar
2023

Include This In Your Hacking Workflow by Continuous Monitoring with AuthoGraphQL (How-to guide)

Include This In Your Hacking Workflow by Continuous Monitoring with AuthoGraphQL (How-to guide) Source link

Samesite by Default and What It Means for Bug Bounty Hunters
12
Mar
2023

Samesite by Default and What It Means for Bug Bounty Hunters

31 January 2020 You have probably heard of the SameSite attribute addition to HTTP cookies since Chrome 51 (and a…

Exploiting a Blind SQL Injection via XSS – RCE Security
11
Mar
2023

Exploiting a Blind SQL Injection via XSS – RCE Security

Introduction You probably have read about my recent swamp of CVEs affecting a WordPress plugin called Transposh Translation Filter, which…

Broken Access Control - Lab #7 User ID controlled by request parameter | Short Version
11
Mar
2023

Broken Access Control – Lab #7 User ID controlled by request parameter | Short Version

Broken Access Control – Lab #7 User ID controlled by request parameter | Short Version Source link

How To Predict Random Numbers Generated By A Computer
11
Mar
2023

How To Predict Random Numbers Generated By A Computer

How To Predict Random Numbers Generated By A Computer Source link

PoC RCE
11
Mar
2023

Basic recon to RCE III

For the 3rd and I think last episode of the series, we’re going to continue with the same target as…