Rikesh BaniyaAccount Takeover using SSO LoginsCompanies often provide various login methods for users to authenticate their accounts.1d ago2
NajeebkmHow I Discovered a $7,000 Critical Vulnerability: IDOR to BAC to Account TakeoverI discovered a vulnerability in a web application’s user management system. The chain of exploits involved IDOR, BAC and ATO.1h ago1h ago
Ahmex000Story Of 15 Vulnerabilities in one public BBP !Welcome it’s Ahmex000 again Today I will share with you my 12 Bug in My favorite functional and my favorite type of vulnerabilities , Yes…Dec 36Dec 36
Mahmoud Abd AlkarimBug Bounty Findings: 10 Major Vulnerabilities Exposed in Cloverleaf’s Application — IDOR — Part 2Welcome to the second part of my series on security issues found in Cloverleaf’s web application (app.cloverleaf.me). In this article…14h ago14h ago
Rikesh BaniyaAccount Takeover using SSO LoginsCompanies often provide various login methods for users to authenticate their accounts.1d ago2
NajeebkmHow I Discovered a $7,000 Critical Vulnerability: IDOR to BAC to Account TakeoverI discovered a vulnerability in a web application’s user management system. The chain of exploits involved IDOR, BAC and ATO.1h ago
Ahmex000Story Of 15 Vulnerabilities in one public BBP !Welcome it’s Ahmex000 again Today I will share with you my 12 Bug in My favorite functional and my favorite type of vulnerabilities , Yes…Dec 36
Mahmoud Abd AlkarimBug Bounty Findings: 10 Major Vulnerabilities Exposed in Cloverleaf’s Application — IDOR — Part 2Welcome to the second part of my series on security issues found in Cloverleaf’s web application (app.cloverleaf.me). In this article…14h ago
InCyber Security Write-upsbyGuru Prasad PattanaikHow I Secured The Indian Army?Hello, Infosec Community!2d ago6
InAWS Tipby1dayHow I Exploited Amazon Cognito Misconfigurations to Access Confidential S3 DataIntroduction4d ago3