Some critical vulnerabilities found with passive analysis on bug bounty programs explained |
|
|
|
Business logic flaw in the invitation system allows to Takeover any account at a private company |
|
|
|
Banner Grabbing to DoS and Memory Corruption |
|
|
|
Bypassing rate limit abusing misconfiguration rules |
|
|
|
When Cookie Hijacking + HTML Injection become dangerous |
|
|
|
Taking over Google calendar of a company |
|
|
|
From Security Misconfiguration to Gaining Access of SMTP server |
|
|
|