writeups.xyz
/
Konga
Title
Vulnerabilities
Programs
Authors
What is kong & why we’re relying on it
RCE
Sandbox Escape
Authentication Bypass
Hardcoded Credentials
Broken Access Control
Privilege Escalation
JWT
Konga
Laluka (@TheLaluka)
Page 1 of 1