Cross Site Scripting (XSS)
- From P5 to P2 to 100 BXSS
- Google Acquisition XSS (Apigee)
- DOM-Based XSS at accounts.google.com by Google Voice Extension
- XSS on Microsoft.com via Angular Js template injection
- Researching Polymorphic Images for XSS on Google Scholar
- Netflix Party Simple XSS
- Stored XSS in google nest
- Self XSS to persistent XSS on login portal
- Universal XSS affecting Firefox
- XSS WAF Character limitation bypass like a boss
- Self XSS to Account Takeover
- Reflected XSS on Microsoft subdomains
- The tricky XSS
- Reflected XSS in AT&T
- XSS on Google using Acunetix
- Exploiting websocket application wide XSS
- Reflected XSS with HTTP Smuggling
- XSS on Facebook instagram CDN server bypassing signature protection
- XSS on Facebook’s Acquisition Oculus
- XSS on sony Subdomain
- Exploiting Self XSS
- Effortlessly Finding Cross Site Scripting inclusion XSSI
- Bugbounty a DOM XSS
- Blind XSS : a mind Game
- FireFox IOS QR code reader XSS(CVE-2019-17003)
- HTML injection to XSS
- CVE-2020-13487 Authenticated Stored Cross-site Scripting in bbPress
- XSS at error page of repository code
- XSS like a Pro
- How I turned self XSS to stored XSS via CSRF
- XSS Stored on Outlook web
- XSS Bug 20 Chars Blind XSS Payload
- XSS in AMP4EMAIL(DOM clobbering)
- DOM Based XSS bug bounty writeup
- XSS will never die
- 5000 USD XSS issue at avast desktop antivirus
- XSS to account takeover
- How Paypal helped me to generate XSS
- Bypass Uppercase filters like a PRO(XSS advanced methods)
- Stealing login credentials with reflected XSS
- bughunting xss on cookie popup warning
- XSS is love
- Oneplus XSS vulnerability in customer support portal
- Exploiting cookie based XSS by finding RCE
- Stored XSS on zendesk via macros
- XSS in ZOHO main
- DOM based XSS in private program
- Bugbounty writeup : Take Attention and get stored XSS
- How I xssed admin account
- Clickjacking XSS on google
- Stored XSS on laporbugid
- Leveraging angularjs based XSS to privilege escalation
- How I found XSS by searching in shodan
- Chaining caache poisining to stored XSS
- XSS to RCE
- XSS on twitter worth 1120
- Reflected XSS in ebay.com
- Cookie based XSS exolpoitation 2300 bug bounty
- What do netcat -SMTP-self XSS have in common
- XSS on google custom search engine
- Story of a Full Account Takeover vulnerability N/A to Accepted
- Yeah I got p2 in 1 minute stored XSS via markdown editor
- Stored XSS on indeed
- Self XSS to evil XSS
- How a classical XSS can lead to persistent ATO vulnerability
- Reflected XSS in tokopedia train ticket
- Bypassing XSS filter and stealing user credit card data
- Googleplex.com blind XSS
- Reflected XSS on error page
- How I was able to get private ticket response panel and fortigate web panel via blind XSS
- Unicode vs WAF
- Story of URI based XSS with some simple google dorking
- Stored XSS on edmodo
- XSSed my way to 1000
- Try harder for XSS
- From parameter pollution to XSS
- MIME sniffing XSS
- Stored XSS on techprofile Microsoft
- Tale of a wormable Twitter XSS
- XSS attacks google bot index manipulation
- From Reflected XSS to Account takeover
- Stealing local storage data through XSS
- CSRF attack can lead to stored XSS
- XSS Reflected (filter bypass)
- XSS protection bypass on hackerone private program
- Just 5 minutes to get my 2nd Stored XSS on edmodo.com
- Multiple XSS in skype.com
- Obtaining XSS using moodle featured and minor bugs
- XSS on 403 forbidden bypass akamai WAF
- How I was turn self XSS into reflected XSS
- A Tale of 3 XSS
- Stored XSS on Google.com
- Stored XSS in the Guides gameplaersion (www.dota2.com)
- Admin google.com reflected XSS
- Paypal Stored security bypass
- Paypal DOM XSS main domain
- Bugbounty The 5k$ Google XSS
- Facebook stored XSS
- Ebay mobile reflected XSS
- Magix bugbounty XSS writeup
Content Security Policy (CSP)
- csp bypass + xss
- www.hackerone.com website CSP “script-src” includes “unsafe-inline”
- https://wakatime.com/ website CSP “script-src” includes “unsafe-inline”
- Unsafe Inline and Eval CSP Usage
Html Injection
- HTML-injection-in-clause-email
- HTML-injection-to-xss-bypass-in
- HTML-injection-in-email
- Chain-the-vulnerabilities-and-take-your-report-impact-on-the-moon-csrf-to-html-injection-which
- Stored-iframe-injection-csrf-account-takeover
- Hunting-good-bugs-with-only-html
- Unauthenticated-account-takeover-through-http-leak
- HTML-injection-unique-exploitation
- How-i-caught-multiple-vulnerabilities-in-udemy-com
- Got-easiest-bounty-with-html-injection-via-email-confirmation
Clickjacking (UI redressing)
- Clickjacking-on-google-myaccount-worth-7500
- How-i-earned-750-bounty-reward-from-at-t-bug-bounty-adesh-kolte
- Binary-com-clickjacking-vulnerability-exploiting-html5-security-features-SandBox
- 1800-worth-clickjacking-1f92e79d0414
- Account-taker-with-clickjacking
- Clickjacking-in-google-docs-and-voice-typing-feature-c481d00b020a
- Google-clickjacking
- https://medium.com/bugbountywriteup/chaining-self-xss-with-ui-redressing-is-leading-to-session-hijacking-pwn-users-like-a-boss-efb46249cd14
- Facebook-clickjacking-how-we-put-a-new-dress-on-facebook-ui
- Clickjacking-xss-on-google-org
- Redressing Instagram leaking application tokens via Instagram clickjacking vulnerability
- Microsoft Yammer clickjacking exploiting HTML5 security features
- Highly wormable clickjacking in player card
- Twitter Periscope Clickjacking Vulnerability
- Clickjacking on donation page
- Stealing User emails by clickjacking cards.twitter.com/xxx/xxx
- Clickjacking at join.nordvpn.com
- Clickjacking is the admin page
- Clickjacking on cas.acronis.com login page
- Clickjacking at ylands.com
Cross Site Request Forgery (CSRF)
- Paypal bug bounty: Updating the Paypal. me profile picture without consent (CSRF attack) - Florian Courtial
- Hacking PayPal Accounts with one click (Patched) - Yasser Ali
- Add tweet to collection CSRF - Vijay Kumar
- Facebookmarketingdevelopers.com: Proxies, CSRF Quandry, and API Fun - phwd
- How I Hack your Beats account? Apple Bug Bounty - @aaditya_purani
- FORM POST JSON: JSON CSRF on POST Heartbeats API - Dr.Jones
- Hacking Facebook accounts using CSRF in Oculus-Facebook integration
- Cross site request forgery (CSRF) - Sjoerd Langkemper - Jan 9, 2019
- Cross-Site Request Forgery Attack - PwnFunction
- Wiping Out CSRF - Joe Rozner - Oct 17, 2017
- Bypass referer check logic for CSRF
- Bypass-referer-check-logic-for-csrf.html
- Messenger-site-wide-csrf/
- Bypass-csrf-with-clickjacking-worth-1250-6c70cc263f40
- Bypass CSRF with clickjacking on Google org
- CSRF combined with IDOR within Document Converter exposes files
- Clickjacking & CSRF attack can be done at https://app.mavenlink.com/login
- How-i-could-have-taken-over-any-pinterest-account
- Leaking-WordPress-CSRF-Tokens
- Paypal-bbp-i-couldve-deleted-all-smc
- Instagram-delete-media-csrf.html
- Wordpress-csrf-to-rce/
- RCE-on-a-facebook-server
- Collecting-shells-by-the-sea-of-nas-vulnerabilities
- CORS-to-CSRF-attack
- 1800-in-less-than-hour
- Googlebugs
- Site-wide-csrf-on-popular-program
- Using-CSRF-i-got-weird-account-takeover
- Admin-hijacked-by-sea-surf-pirates
- How I could have hijacked a victim’s YouTube notifications! (Google VRP Writeup)
- How-i-was-able-to-delete-13k-microsoft-translator-projects
- Fastest-fix-on-open-bug-bounty-platform
- How-a-simple-csrf-attack-turned-into-a-p1-level-bug
- CSRF-critical-exploitable-in-infected-site
- Oauth-misconfiguration-lead-to-complete-account-takeover
- A-very-useful-technique-to-bypass-the-csrf-protection-for-fun-and-profit
- How-i-turned-self-xss-to-stored-via-csrf
- CSRF-vulnerability-leads-to-user-profile-change-in-microsoft-express-logic
- How-i-got-500-from-microsoft-for-csrf-vulnerability
- How-i-made-1000-at-t-bug-bounty-h1
- Lintern-ute-account-takeover-via-csrf-adesh-kolte
- How-i-found-password-bypass-vulnerability-on-private-document-at-scribd-com
- Brute-forcing-user-ids-via-csrf-to-delete-all-users-with-csrf-attack
- Self-xss-to-account-takeover
- Obtaining-xss-using-moodle-features-and-minor-bugs
- How-i-hacked-companies-related-to-the-crypto-currency-and-earned-60-000
- Stored-iframe-injection-csrf-account-takeover
- Account-taken-over-in-style
- Fastest-fix-on-open-bug-bounty-platform
- CSRF-email-confirmation-vulnerability-for-gmail-g-suite-in-facebook
- CSRF-bypass-using-cross-frame-scripting
- CSRF CSRF CSRF
- My-first-csrf-to-account-takeover-worth-750
- Always-escalate-from-self-xss-to-persistent-xss-on-login-portal
- Exploiting-websocket-application-wide-xss-csrf
- JSON-CSRF-attack-on-a-social-networking-site-hackerone-platform
- How-i-csrfd-my-first-bounty
- Self-xss-csrf-to-stored-xss
- ATO-worth-900
- Bypass-csrf-with-clickjacking-worth-1250
- CSRF-token-bypasss-a-tale-of-my-2k-bug
- How-i-exploit-the-json-csrf-with-method-override-technique
- ATO-by-chaining-two-vulnerabilities
- Account-takeover-using-csrf-json-based
- How-i-hacked-one-cryptocurrency-service
- 2fa-bypass-via-csrf-attack
- The-accounttakeover-killing-chain
- 4x-csrfs-chained-for-company-account-takeover
- A-simple-bypass-of-registration-activation-that-lead-to-many-bug-a-story-about-how-my-friend
- Critical-bypass-csrf-protection-on-ibm
- CSRF-account-takeover-explained-automated-manual-bug-bounty
- CSRF-account-takeover-in-a-company-worth-1b
- CSRF-attack-can-lead-to-stored-xss
- How-i-hijacked-your-account-when-you-opened-my-cat-picture
- Stealing-downloads-from-slack-users
- Chain_XSS
- How-i-was-able-to-bypass-the-current-password/
- RXSS-CSRF-bypass-to-account-takeover
- XSS-to-ATO
- Site-wide-CSRF-GraphQL
- Google-bug-bounty-csrf-in-learndigital-withgoogle-com
- An-inconsistent-CSRF
- Yet-other-examples-of-abusing-CSRF-in-logout/
- Facebook-privacy-bug/
- An interesting Google vulnerability that got me 3133.7 reward.
- Facebook CSRF protection bypass which leads to Account Takeover.
- Facebook CSRF bug which lead to Instagram Partial account takeover.
- CSRF logs the victim into attacker’s account
- CSRF log victim into the attacker account
- Login csrf in analytics.mopub.com
- CRITICAL Full account takeover using CSRF
- CSRF at Apply to this program that lead to submit your request automatic with out any validation
- CSRF - Close Account
- CSRF: add item to victim’s cart automatically (starbucks.com - updatecart)
- Cross-Site Request Forgery (CSRF) vulnerability on API endpoint allows account takeovers
- CSRF - Modify Project Settings
- Cross-Site Request Forgery (CSRF)
- CSRF on https://market.my.games
- CSRF - Modify Company Info
Cross Origin Resource Sharing (CORS)
- CORS bug on google’s 404 page (rewarded)
- CORS misconfiguration leading to private information disclosure
- CORS misconfiguration account takeover out of scope to grab items in scope
- Chrome CORS
- Bypassing CORS
- An unexploited CORS misconfiguration reflects further issues
- Think outside the scope of advanced cors exploitation techniques
- A simple CORS misconfiguration leaked private post of Twitter Facebook Instagram
- Exploiting CORS misconfiguration
- Exploiting-misconfigured-cors-via-wildcard-subdomains
- Exploiting insecure CORS API api.artsy.net
- Pre domain wildcard CORS exploitation
- Exploiting misconfigured CORS on popular BTC site
- Cross-origin resource sharing misconfig steal user information bughunterboy bughunterboy
- [██████] Cross-origin resource sharing misconfiguration (CORS) Vadim jarvis7
- CORS Misconfiguration on nordvpn.com leading to Private Information Disclosure,Account takeover
- CORS Misconfiguration [www.zomato.com], could lead to disclosure of sensitive information
- CORS misconfiguration
- CORS Misconfiguration Leads to Exposing User Data
- CORS Bypassing Misconfiguration Leads to Sensitive Exposure
- CORS misconfiguration allows to steal client’s “password”, Authorization token and the customer details e.g. names, SSN, bank account etc.
Same Origin Policy (SOP)
- SOP-bypass-via-browser-cache
- Google-sites-and-exploiting-same-origin-policy
- SOP-bypass
- Stealing-local-files-with-simple-html-file
- Hacking-the-same-origin-policy
- Possible SOP bypass in www.starbucks.com due to insecure crossdomain.xml
- CSRF possible when SOP Bypass/UXSS is available
- SOP bypass using browser cache
Open Redirect
- [Report-246897] Open Redirect on Twitter: Eldeeb
- [Report-103772] Open Redirect on Shopify: .np
- [Report-309058] Open Redirect on Wordpress: @
- [Report-260744] Open Redirect and XSS on Twitter: https://dev.twitter.com/https:/%5cblackfan.ru/
- [Report-320376] Open Redirect on HackerOne: after index.php/XYZ
- [Report-111968] Interstitial redirect bypass / Open Redirect on HackerOne Zendesk Session
- [Report-244721] Open Redirect on Mail.Ru
- [Report-236599] Open Redirect on ExpressionEngine
- [Report-299403] Open Redirect on HackerOne: RTLO
- [Report-239503] Open Redirect & Information Disclosure on HackerOne
- [Report-210875] Open Redirect via Host Header
- [Report-119236] Open Redirect on Uber: IP address to a single number
- [Report-126203] Open Redirect on Uber
- [Report-144525] Open Redirect bypass on New Relic
- [Report-104087] Open Redirect bypass using svg on Slack
- [Report-179568] Open Redirect via window.opener on Open-Xchange
- Open Redirect to RCE on Google Hangouts Electron app & RCE Tweet
Information Disclosure
- I-found-gcp-service-account-tokennow GCP
- What-is-your-gcp-infra-worthabout-700 GCP
- Getting-access-zendesk-gcp GCP
- Aaronesau blog Debug
- From-github-recon-to-account-takeover ATO
- Graphql-bug-to-steal-anyones-address GraphQl
- How-recon-helped-samsung-protect-their-production-repositories-of-samsungtv-ecommerce-estores IMPORTANT
- Accessing 2 million Verizon Pay Monthly contracts
- Business-logic-plex-tv
- Leak-can-i-take-user-information-please
- How-i-could-have-hacked-all-uber-accounts
- How-i-found-credential-enriched-redis-dump
- How-to-look-for-js-files-vulnerability-for-fun-and-profit
- Unauthorized-access-to-all-user-information-leaks
- How-i-get-my-first-p1-sensitive-information-disclosure-using-wpscan
- Recon-to-sensitive-information-disclosure-in-minutes
Denial Of Service (DOS)
- Long String DOS
- Banner grabbing to DOS and memory corruption
- profile-picture name parameter with large value lead to DoS for other users and programs on the platform
- XMLRPC.php FILE IS enable it will used for Bruteforce attack and Denial of Service(DoS)
- XMLRPC.php FILE IS enable it will be used for brute force attack and denial of service
- DOS on the Issue page by exploiting Mermaid.
- Character limitation bypass can lead to DoS on Twitter App and 500 Internal Server Error
- Permanent DoS with one click.
- A very long name in hey.com can prevent anyone from accessing their contacts and probably can cause denial of service
- ActiveStorage throws exception when using whitespace as filename, may lead to denial of service of multiple pages
- Denial of Service twitter.com & mobile.twitter.com
- DOS attack via comment on Issue
- DOS of https://nordvpn.com/ via CVE-2018-6389 exploitation
- Denial of Service [Chrome]
- DOS: type confusion in mrb_no_method_error
- Api.tumblr.com Denial of Service by cookies manipulation
- Application DOS via specially crafted payload on 3d.cs.money
- Pixel Flood Attack leads to Application level DoS
- lack of input validation that can lead Denial of Service (DOS)
Simple Storage Service (S3)
- Open AWS S3 bucket leaks all Images uploaded to Zomato chat
- AWS S3 bucket writeable for authenticated aws users
- Open S3 Bucket Accessible by any Aws User
- Open S3 Bucket WriteAble To Any Aws User
- API - Amazon S3 bucket misconfiguration
- No ACL on S3 Bucket in [https://www.██████████/]
- Amazon S3 bucket misconfiguration (share)
- Listing of Amazon S3 Bucket accessible to any amazon authenticated user (metrics.pscp.tv)
- S3 bucket Upload on studio.redditinc.com (s3-r-w.ap-east-1.amazonaws.com)
- unclaimed s3 bucket takeover in the 3 js file located on the github page of brave software
- S3 bucket data at http://rockset-support.s3-us-west-2.amazonaws.com/ reveals user addresses based on latitudes and longitudes.
- Writable RubyCi Amazon s3 bucket
- public report - Reproducible - Writable RubyCi Amazon s3 bucket[207053]
- niche s3 buckets are readable/writeable/deleteable by authorized AWS users
- How-i-dumped-millions-of-crypto-currencies-accounts
- Subdomain Takeover on happymondays.starbucks.com due to non-used AWS S3 DNS record
- Subdomain takeover via unsecured s3 bucket
SQLI
- SQL injection in Harvard subdomain
- SQLi in HackerOne (crit)
- SSRF to sqli
- Blind sqli Hootsuite
- Tesla motors blind sql injection ’ + sleep(10) + ‘
- Popping_a_shell_on_the_oculus_developer_portal
- Pwning-child-company-to-get-access-to-parentcompanys-slack-team
- SQL-injection-in-insert-update-query-without-comma
- SQLI-extracting-data-without-knowing-columns-names
- SQLI-bootcampnutanix-com-bug-bounty-poc
- Zol-zimbabwe-authbypass-sqli-xss
- SQLI-login-bypass-autotraders
- SQL-injection-via-stopping-the-redirection-to-a-login-page
- Yahoo-root-access-sql-injection-tw-yahoo-com
- Step-by-step-exploiting-sql-injection
- Fileupload-blind-sqli
- First-bug-bounty-submission
- Exploiting-a-tricky-blind-sql-injection-inside-limit-clause
- H1-4420-From-Quiz-to-Admin-Chaining-Two-0-Days-to-Compromise-an-Uber-Wordpress
- Hacking-the-nhs-for-fun-and-no-profit
- Hacking-makes-me-forget-my-pain
- SQL-injection-vulnerability-in-university-of-cambridge
- SQL-injection-bug-bounty
- Shodan-is-your-friend-if-you-lose-him-you-will-lose-many
- SQL-injection-through-user-agent
- Union-based-sql-injection-write-up-a-private-company-site
- SQL-injection-for-50-bounty-but-still-worth-reading
- Source-code-analysis-in-ysurvey-luminate-bug
- SQL-injection-saadahmedx
- A-five-minute-sql-i
- Bug-bounty-writeups-exploiting-sql-injection-vulnerability
- Youtube
- bypass sql injection #1109311
- SQL injection in https://www.acronis.cz/ via the log parameter
- blind sql injection
- Time based sql injection
- [critical] sql injection by GET method
- Blind SQL Injection
- SQL injection [futexpert.mtngbissau.com]
- Sql injection on docs.atavist.com
- [windows10.hi-tech.mail.ru] Blind SQL Injection
- SQL injection in https://labs.data.gov/dashboard/datagov/csv_to_json via User-agent
- Blind SQL injection in Hall of Fap
- SQL Injection in ████
- SQL Injection in ████
EXternal Xml Entity (XXE)
- External-xml-entity-via-file-upload-svg
- 0day-writeup-xxe-in-ubercom
- An-interesting-xxe-in-sap
- Bug-bounty-fastmail
- Exploiting-xxe-with-local-dtd-files
- XSS-to-XXE-in-Prince
- Multiple-vulnerabilities-in-oracle-ebs
- From-blind-xxe-to-root-level-file-read-access
- SOAP-based-unauthenticated-out-of-band-xml-external-entity-oob-xxe-in-a-help-desk-software
- How-i-loose-5005-in-a-day-dos-billion-laugh-attack-xxe
- XXE at ecjobs.starbucks.com.cn/retail/hxpublic_v6/hxdynamicpage6.aspx
- XXE on sms-be-vip.twitter.com in SXMP Processor
BLIND - XXE OOB ❌
- A-tale-of-two-formats-exploiting-insecure-xml-and-zip-file-parsers-to-create
- How-I-Found-CVE-2018-8819-Out-of-Band-(OOB)-XXE
- XXE-oob-exploitation-at-java-17
- Blind-xml-external-entities-out-of-band-channel-vulnerability-paypal-case-study
- OOB-xxe-in-prizmdoc-cve-2018-15805
- Exploiting-out-of-band-xxe-using
- Blind XXE via Powerpoint files
- Phone Call to XXE via Interactive Voice Response
- XXE in Site Audit function exposing file and directory contents
Insecure Direct Object References (IDOR)
- IDOR in HackerOne
- IDOR with Geolocation data not stripped from images
- IDOR in HackerOne
- How-i-could-have-hacked-your-uber-account
- IDOR-via-websockets
- Fbctf-IDOR/
- Disclosing privately shared gaming clips of any user
- Adding anyone including non-friend and blocked people as co-host in personal event!
- Page analyst could view job application details
- Deleting Anyone’s Video Poll
- IDOR bug to See hidden slowvote of any user even when you dont have access right
- IDOR allow to extract all registered email
- Another image removal vulnerability on Facebook
- Gsuite Hangouts Chat 5k IDOR
- How I pwned a company using IDOR and Blind XSS
- Disclose Private Dashboard Chart’s name and data in Facebook Analytics
- DoD_IDOR
- IDOR when editing users leads to Account Takeover without User Interaction at CrowdSignal
- IDOR leads to Edit Anyone’s Blogs / Websites
- IDOR and statistics leakage in Orders
- IDOR in https://3d.cs.money/
- IDOR leading to downloading of any attachment
- IDOR when moving contents at CrowdSignal
- IDOR unsubscribe Anyone from NextClouds Newsletters by knowing their Email
- IDOR to delete images from other stores
- IDOR in marketing calendar tool
- IDOR when creating App on [platform.streamlabs.com/api/v1/store/whitelist] with user_id field
- IDOR with Geolocation data not stripped from images
- IDOR in semrush academy
- IDOR on the DELETE /comments/
- IDOR [NR Insights] - Modify the filter settings for any NR Insights dashboard through internal_api endpoint
- IDOR in editing courses
- IDOR when editing email leads to Account Takeover on Atavist
- IDOR to view User Order Information
- IDOR on deleting drafts on https://apps.topcoder.com/wiki/users/viewmydrafts.action via discardDraftId parameter
- IDOR - Deleting other user’s signature via /appsuite/api/snippet?action=update (although an error is thrown)
- IDOR to view User Order Information
HTTP Parameter Pollution (HPP)
- Recaptcha-bypass-via-http-parameter-pollution
- Twitter-hpp-vulnerability
- Improper-input-validation-add-custom-text-and-urls-in-sms-send-by-snapchat-bug-bounty-poc
- Tale-of-account-takeovers-part
- Bugbounty-compromising-user-account-how-i-was-able-to-compromise-user-account-via-http
- From-parameter-pollution-to-xss
- How-i-earned-60k-from-private-program
Host Header Injection (HHI)
- Love-story-of-account-takeover-chaining
- Host-header-injection
- How-i-was-able-to-take-over-any-users-account-with-host-header-injection
- Pwn-them-all-bugbounty
- How-i-earned-800-for-host-header-injection-vulnerability
- 10k-host-header
- ATO-via-host-header-poisoning
- From-host-header-injection-to-sql-injection
- Awesome-host-header-injection-worth-2k
- Bugbounty-rewarded-by-securing-vulnerabilities-in-bookmyshow-indias-largest-online-movie
- Host Header Injection
- Host header injection/redirection signup and login page
- Host Header Injection/Redirection in:https://www.instacart.com/
- Email link poisoning / Host header attack
- Host Header Injection - irccloud.com
- Host header injection/redirection via newsletter signup
- Host Header Injection/Redirection
- Host header Injection
- Header Injection In app.legalrobot.com
- Password Reset link hijacking via Host Header Poisoning
- Host Header Injection/Redirection
- Modify Host Header which is sent to email
- Host Header Injection / Cache Poisoning
- Host Header poisoning on gratipay.com
- Host Header is not validated resulting in Open Redirect
Server Side Request Forgery (SSRF)
- SSRF to SQLI
- Escalating xss in phantomjs image rendering to ssrflocal file read
- Escalating-blind-ssrf-get-rce-santosh-kumar-sha
- aws-takeover-ssrf-javascript
- Local-file-read-via-xss-in-dynamically
- AWS-takeover-ssrf-javascript
- Downnotifer-ssrf
- Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul
- Esea-server-side-request-forgery-and-querying-aws-meta-data
- Airbnb-chaining-third-party-open-redirect-into-server-side-request-forgery-ssrf-via-liveperson-chat
- Escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read/
- Yahoo-small-business-luminate-and-the-not-so-secret-keys
- SSRF-vulnerability-in
- My-first-ssrf-using-dns-rebinfing/
- Bugbounty-a-simple-ssrf/
- Blind-ssrf-in-stripe-com-due-to-sentry-misconfiguration
- Jow-i-convert-ssrf-to-xss-in-a-ssrf-vulnerable-jira
- Escalating-ssrf-to-rce
- How-outdated-jira-instances-suffers-from-multiple-security-vulnerabilities
- How-i-found-xss-via-ssrf-vulnerability-adesh-kolte
- Gain-adfly-smtp-access-with-ssrf-via-gopher-protocol
- Pdfreacter-ssrf-to-root-level-local-file-read-which-led-to-rce
- Piercing-the-veal-short-stories-to-read-with-friends
- Vimeo-upload-function-ssrf
- 1-000-ssrf-in-slack
- SSRF-trick-ssrf-xspa-in-microsofts-bing-webmaster-central
- Hunting-good-bugs-with-only-html
- Blind-ssrf-on-coda-io
- Chain-of-hacks-leading-to-database-compromise
- The-journey-of-web-cache-firewall-bypass-to-ssrf-to-aws-credentials-compromise
- The-unusual-case-of-open-redirection-to-aws-security-credentials-compromise
- Pcextreme-nl-fake-bug-bounty
- SSRF-on-pdf-generator
- Reading-internal-files-using-ssrf-vulnerability
- Using-vulnerability-analytics-feature-like-a-boss
- SSRF-via-ffmpeg-hls-processing
- SSRF-to-read-local-files-and-abusing-the-aws-metadata
- SSRF-in-openid-support
- Yhe-story-of-blind-ssrf-leads-to-internal-host-discovery
- vimeo-ssrf-with-code-execution-potential
- Just-another-tale-of-severe-bugs-on-a-private-program
- How-i-found-an-ssrf-in-yahoo-guesthouse-recon-wins-8722672e41d4
- From-ssrf-to-local-file-disclosure
- SSRF-port-issue-hidden-approch
- Exploiting-ssrf-like-a-boss-c090dc63d326
- Exploiting-an-ssrf-trials-and-tribulations-14c5d8dbd69a
- The-bugs-are-out-there-hiding-in-plain-sight-12d056613ea3
- Bug-bounty-fastmail
- Piercing-the-veil-server-side-request-forgery-to-niprnet-access
- SSRF_P4toP2
- Old-but-gold-dot-dot-slash-to-get-the-flag-uber-microservice
- Google-vrp-ssrf-in-google-cloud-platform-stackdriver
- Into-the-borg-ssrf-inside-google-production-network
- CVE-2018-16794-on-fs-thefacebook-com
- Stored-XSS-and-SSRF-Google
- Exploiting-single-request-for-multiple
- How-i-got-access-to-local-aws-info-via-jira
- SSRF-in.html#.XGWpfioiVM4.twitter
- SSRF-reading-local-files-from-downnotifier-server/
- Ok-google-give-me-all-your-internal-dns-information/
- 01-slack-webrtc-turn-compromise/
- Getting-read-access-on-edmodo.html
- A-pair-of-plotly-bugs-stored-xss-and-aws-metadata-ssrf/
- Exploiting an SSRF trials and tribulations
- SSRF on PDF generator
- Google VRP SSRF in Google cloud platform stackdriver
- Vimeo upload function SSRF
- SSRF via ffmeg processing
- My first SSRF using DNS rebinding
- Bugbounty simple SSRF
- SSRF reading local files from downnotifier server
- SSRF vulnerability
- Gain adfly SMTP access with SSRF via gopher protocol
- Blind SSRF in stripe.com due to senntry misconfiguration
- SSRF port issue hidden approch
- The jorney of web cache firewall bypass to SSRF to AWS credentials compromise
- SSRF to local file read and abusing aws metadata
- pdfreactor SSRF to root level local files read which lead to RCE
- SSRF trick : SSRF XSPA in micosoft’s bing webwaster
- Downnotifeer SSRF
- Escalating SSRF to RCE
- Vimeo SSRF with code execution potential
- SSRF in slack
- Exploiting SSRF like a boss
- AWS takeover SSRF javascript
- Into the borg of SSRF inside google production network
- SSRF to local file disclosure
- How I found an SSRF in yahoo guesthouse (recon wins)
- Reading internal files using SSRF vulnerability
- Airbnb chaining third party open redirect into SSRF via liveperson chat
- SSRF in Exchange leads to ROOT access in all instances
- SSRF using Javascript allows to exfill data from Google Metadata
- SSRF in Google cloud platform stackdriver
- SSRF to ROOT Access
- SSRF reading local files from downnotifier server
- Facebook SSRF
- 31k$ SSRF in Google Cloud Monitoring led to metadata exposure
- How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
- My Expense Report resulted in a Server-Side Request Forgery (SSRF) on Lyft to Lyft
- SSRF in Exchange leads to ROOT access in all instances to Shopify
OS Command Injection
- Command Injection (via CVE-2019-11510 and CVE-2019-11539)
- RCE using bash command injection on /system/images (toimitilat.lahitapiola.fi)
- Remote Code Execution via Extract App Plugin
- OS Command Injection in Nexus Repository Manager 2.x(bypass CVE-2019-5475)
- https://hackerone.com/reports/212696
LFI/LFD - Path Traversal - RFI
Remote File Inclusion (RFI)
Path Traversal
- Path Traversal allowing to read any files on the server
- Directory traversal at https://nightly.ubnt.com
- Remote code execution via path traversal in Zip extraction in the Extract app
- Path traversal on ████████
- Critical Full local fylesystem access (LFI/LFD) as admin via Path Traversal in the misconfigured Java servlet on the https://███/
- Path traversal leading to limited CSRF on GET requests on two endpoints
Local File Inclusion (LFI)
- [https://███] Local File Inclusion via graph.php
- Local File Inclusion In Registration Page
- Local File Include on marketing-dam.yahoo.com
- Local files reading from the web using
brave://
- RFI LFI Writeup
- How we got LFI in apache drill recom like a boss
- Bugbounty journey from LFI to RCE
- From LFI to RCE via PHP sessions
- magix bugbounty magix.com XSS RCE SQLI and LFI
- Escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read
- Chain-the-bugs-to-pwn-an-organisation-lfi-unrestricted-file-upload-remote-code-execution
- Chain-of-hacks-leading-to-database-compromise
- The-journey-of-web-cache-firewall-bypass-to-ssrf-to-aws-credentials-compromise
- LFI-to-command-execution-deutche-telekom-bug-bounty
- Client-not-client
- Exploiting-ssrf-like-a-boss
- Bugbounty-journey-from-lfi-to-rce-how
File Upload
- Exploiting-file-uploads-pt-2
- External-xml-entity-via-file-upload-svg
- Arbitary-File-Upload-Too-Stored-XSS
- My-first-rce-stressed-employee-gets-me-2x-bounty
- Remote-image-upload-leads-to-rce-inject-malicious-code-to-php-gd-image
- Vimeo-upload-function-ssrf
- Manageengine-servicedesk-plus-arbitrary-file-upload
- From-file-upload-to-email-pass
- Uploading-backdoor-for-fun-and-profit-rce-db-cred-p1
- Simple-remote-code-execution-vulnerability-examples-for-beginners
- Unrestricted-file-upload-to-rce-bug-bounty-poc
- How-i-gain-unrestricted-file-upload-remote-code-execution-bug-bounty
- How-i-found-rce-but-got-duplicated
- Race-condition-that-could-result-to-rce-a-story-with-an-app-that-temporary-stored-an-uploaded
- Asus-rce-vulnerability-on-rma-asus-europe-eu
- Exploitation-of-the-cve-2018-15961-unrestricted-file-upload-in-adobe-coldfusion
- Unrestricted-file-upload-on-pdf
- Uploading files to api.techprep.fb.com
- How I got stored XSS using a file upload
- Chain the bugs to pwn an organization LFI unrestricted file upload to RCE
- File Upload blind SQLI
- Path traversal while uploading results in RCE
- RCE by uploading a web config
- How-i-hacked-facebook-and-received-a-3500-usd-facebook-bug-bounty
- Chaining-tricky-oauth-exploitation-to-stored-xss-b67eaea4aabd
- RTL override symbol not stripped from file names
- XSS by image file name
- Arbitrary file upload and stored XSS via ███ support request
- Unrestricted File Upload on https://app.dropcontact.io/app/upload/
- Unrestricted file upload leads to Stored XSS
- Unrestricted file upload on the image of contacts
- File Upload XSS in image uploading of App in mopub