5 Different Vulnerabilities in Google’s Threadit |
|
|
|
Broken Access Control Leads To Change Of Admin Details |
|
|
|
Full PoC | Metasploit Pro Trial License Request Limit Bypass |
|
|
|
Two account takeover bugs worth $4300 🎁 |
|
|
|
How did I earned 6000$ from tokens and scopes in one day |
|
|
|
A New Attack Surface on MS Exchange Part 1 - ProxyLogon! |
|
|
|
How we was able to takeover whole organization via Privilege Escalation |
|
|
|
Multiple Vulnerabilities In cPanel/WHM |
|
|
|
Privilege Escalation | stealing user’s point | Bugcrowd |
|
|
|
How I Found Multiple Bugs On FaceBook In 1 Month And a Part For My Methodology & Tools |
|
|
|
From Information Disclosure to interesting Privilege Escalation |
|
|
|
Unprivileged User with Read/Write permission to `User Access` can escalate their role to ADMIN — Privilege Escalation |
|
|
|
Part-1 Dive into Zoom Applications |
|
|
|
Joomla Password Reset Vulnerability And A Stored XSS For Full Compromise |
|
|
|
Metadata service MITM allows root privilege escalation (EKS / GKE) |
|
|
|
Finding and Exploiting Unintended Functionality in Main Web App APIs |
|
|
|
Mass Assignment exploitation in the wild - Escalating privileges in style |
|
|
|
CVE-2021-27075: Microsoft Azure Vulnerability Allows Privilege Escalation and Leak of Private Data |
|
|
|
The False Oracle — Azure Functions Padding Oracle Issue |
|
|
|
DMCA.COM Hack, Full Disclosure (With Proof-of-Concept) |
|
|
|
How I leveraged XSS to make Privilege Escalation to be Super Admin! |
|
|
|
Any Account Takeover Through Privilege Escalation |
|
|
|
I Own your Cloud Shell: Taking over “Azure Cloud Shell” Kubernetes Cluster Through Unsecured Kubelet API 30,000$ Bounty |
|
|
|
How I Gain Access to the Server Administration of a Million-Dollar Company |
|
|
|
How We Escaped Docker in Azure Functions |
|
|
|