Non-Production Endpoints as an Attack Surface in AWS |
|
|
|
Amplified exposure: How AWS flaws made Amplify IAM roles vulnerable to takeover (CVE-2024-28056) |
|
|
|
Bypass Cognito Account Enumeration Controls |
|
|
|
Two Minor Cross-Tenant Vulnerabilities in AWS App Runner |
|
|
|
Using an Undocumented Amplify API to Leak AWS Account IDs |
|
|
|
Bypassing CloudTrail in AWS Service Catalog, and Other Logging Research |
|
|
|
AWS CloudTrail vulnerability: Undocumented API allows CloudTrail bypass |
|
|
|
A Confused Deputy Vulnerability in AWS AppSync |
|
|
|
XSS in the AWS Console |
|
|
|