Best Quality
0 7/10
vulnerability

Compound's liquidation mechanism fails to validate whether seized assets are actually held as collateral by the borrower, allowing liquidators to seize any user cTokens regardless of whether they were entered into markets. This can result in unauthorized asset seizure even for assets the user explicitly exited from.

Compound CVE-2021-26119
trust-security.xyz · Trust · 23 hours ago · details
0 7/10
vulnerability

Brahma.Fi's L2 position handler miscalculates the value of positions in negative states due to sign confusion in the positionInWantToken() function, where negative account values (indicating underwater accounts rather than short positions) are treated as positive, leading to incorrect share issuance, excess withdrawals, and potential protocol insolvency.

Brahma.Fi PerpV2Controller PerpTradeExecutor Perpetual Protocol Optimism
trust-security.xyz · Trust · 23 hours ago · details
0 7/10
tutorial

Educational writeup on array input validation vulnerabilities in Substrate smart contracts, demonstrating how missing percentage validation in a voting function allows attackers to exceed 100% voting weight across multiple pools or repeat pool IDs to multiply voting power and drain rewards.

Bifrost Finance Matue Solo VeMinting Farming BoostVotingPools
medium.com · Matue · 23 hours ago · details
0 7/10
-
vulnerability

A cross-chain messaging protocol's signature verification can be bypassed when a new domain is added: if enrollValidator is called before setThreshold, the commitment is saved with threshold=0, allowing attackers to frontrun setThreshold and process unsigned messages with a malicious commitment hash matching the stored zero-threshold commitment.

Heuss Immunefi ECDSA
medium.com · Heuss · 23 hours ago · details
0 7/10

Security researcher discovered an RCE vulnerability in a PHP application by exploiting insufficient input validation on a user ID parameter passed to shell_exec(curl) calls. By bypassing the integer-only check and injecting backtick-delimited shell commands, the attacker achieved code execution running as root.

Uranium238s HackerOne Burp
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A security researcher bypassed a custom token-based rate-limiting protection in an Android application by using FRIDA to dynamically hook and overload the native token generation method at runtime, allowing brute-force attacks to succeed by circumventing rate-limit detection through method signature manipulation.

FRIDA JADX IDA Burpsuite Genymotion Android ACME
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A researcher discovered a critical vulnerability chain in a multi-tenant business data management app: predictable, non-expiring invitation tokens with no signature protection allowed brute-forcing access to organizations, coupled with a secondary issue allowing visibility of pending admin invitations enabled full organizational takeover with minimal detection risk.

Plenum InfoSec Write-ups
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Two well-known but still exploitable RCE vulnerabilities in Atlassian products: CVE-2019-11581 in Jira's ContactAdministrators form via Java expression injection, and CVE-2019-3396 in Confluence's Widget Connector macro allowing arbitrary file access and command execution via the _template parameter. The article provides step-by-step exploitation techniques with proof-of-concept payloads.

CVE-2019-11581 CVE-2019-3396 Jira Confluence Atlassian Valeriy Shevchenko Knownsec 404 ruvlol
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10
bug-bounty

Michael Stepankin discovered an RCE vulnerability in PayPal's manager.paypal.com caused by unsafe Java object deserialization of the 'oldFormData' parameter, exploitable via Commons Collections gadget chain using ysoserial-generated payloads to execute arbitrary shell commands with database access.

PayPal manager.paypal.com Michael Stepankin Artsploit Chris Frohoff Gabriel Lawrence Mark Litchfield FoxGlove Security ysoserial Commons Collections
artsploit.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

This article details a real-world RCE vulnerability chain on Adobe Experience Manager (AEM) 6.1, exploiting exposed Felix Console through dispatcher bypass (CVE-2016-0957), default credentials (admin/admin), and malicious OSGi bundle deployment. The author provides step-by-step methodology for gaining code execution without Java knowledge by using pre-built exploitation tools.

CVE-2016-0957 Adobe Experience Manager AEM Apache Felix Apache Sling OSGi aem_hacker.py aem-rce-bundle Mikhail Egorov 0ang3el Peter Adkins Darkarnium byq
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A rate-limiting bypass vulnerability allowed attackers to brute-force Instagram account passwords through Facebook's mobile endpoint by distributing attempts across multiple test accounts created via Facebook apps, enabling up to 6 million password attempts daily instead of the intended 20 per account.

Instagram Facebook Sameer Rao mbasic.facebook.com
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

TinyCards Android app loaded initial web content over HTTP instead of HTTPS, allowing MITM attackers to inject malicious JavaScript into the WebView and achieve code execution. The vulnerability was fixed in v1.0 (version code 10) by switching to SSL for initial content loading.

CVE-2017-16905 DuoLingo TinyCards Google Play Security Reward Program Nightwatch Cybersecurity Yakov Shafranovich
wwws.nightwatchcybersecurity.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A Flask/Jinja2 template injection vulnerability was discovered in an email generation utility that evaluated user input in email subject fields. The attacker exploited Python object introspection through Jinja2 syntax to access the file class and read sensitive files including configuration files with API keys and encryption keys from a GCE instance.

Flask Jinja2 Django Bugcrowd AkShAy KaTkAr Wappalyzer GCE
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A researcher discovered a Server-Side Request Forgery (SSRF) vulnerability using DNS rebinding to bypass IP-based access controls, escalating through AWS metadata enumeration and Monit admin interface exploitation to achieve instance shutdown and memory disclosure. The writeup details the methodology, tool creation, and real-world exploitation chain that combined multiple vulnerabilities.

CVE (buffer overread in Monit) AWS metadata service (169.254.169.254) Monit Admin interface Fireshell CTF 2019 Jan Masarik dnsFookup tool lock.cmpxchg8b.com/rebinder.html
geleta.eu · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A CORS misconfiguration vulnerability where a website trusts all origins ending with a specific domain (e.g., evilredacted.com for redacted.com), allowing an attacker who registers a predomain wildcard subdomain to make authenticated requests and steal session credentials via JavaScript. The attacker registers a domain like kiraakredacted.com and crafts a malicious page that calls the /v1/user API endpoint with credentials enabled to extract user session IDs.

Arbaz Hussain HackerOne PortSwigger InfoSec Write-ups
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10
bug-bounty

Security researcher Josip Franjković discovered four SQL injection vulnerabilities across Nokia domains between April-July 2013, exploiting blind SQL injection in INSERT queries via User-Agent headers and time-based attacks on legacy PHP sites, earning a Nokia Lumia 820 and Top Reporter status.

Nokia Josip Franjković Bryan de Houwer www4.nokia.de nokia.es Nokia Lumia 820 Nokia Lumia 920
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A critical Slack SAML authentication bypass vulnerability caused by failure to validate the Audience restriction element in SAML assertions, allowing attackers to present assertions meant for other service providers (e.g., expired Github assertions) to gain unauthorized access to Slack accounts. The vulnerability exploited the "confused deputy problem" and was reported and patched in 2017.

Slack SAML Raider Ioannis Kakavas Github HackerOne Max Feldman CVE-2016-0701
blog.intothesymmetry.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Security researcher Josip Franjković documents race condition vulnerabilities discovered on Facebook, DigitalOcean, and LastPass that allow attackers to bypass single-use restrictions on page reviews, usernames, and promo codes by sending concurrent requests to trigger non-atomic operations. The bugs were responsibly disclosed and patched across all affected platforms.

Facebook DigitalOcean LastPass Josip Franjković GitHub
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

SQL injection vulnerability in tw.stock.yahoo.com's getjson.php endpoint exploited via double URL encoding (%2527) to bypass single-quote filtering, achieving root database access and ability to extract MySQL password hashes.

Yahoo tw.yahoo.com tw.stock.yahoo.com
buer.haus · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10
vulnerability

AirDoS is a denial-of-service vulnerability in iOS that allows attackers to remotely spam nearby iPhones/iPads with infinite AirDrop share popups, rendering the UI unusable until the device is restarted or the user escapes Bluetooth/WiFi range. Apple patched it in iOS 13.3 (December 2019) with a rate limit that auto-declines requests after 3 rejections from the same device.

AirDoS iOS 13.3 macOS Catalina 10.15.2 opendrop Milan Stute Alexander Heinrich Apple
kishanbagaria.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A researcher discovered an unauthenticated Apache Solr instance running on a Microsoft subdomain and exploited CVE-2019-17558 through Velocity template injection to achieve remote code execution. The vulnerability required two steps: enabling the resource loader via config API, then injecting malicious Velocity templates to execute arbitrary commands.

CVE-2019-17558 Microsoft Apache Solr tide90.microsoft.com Muhammad Khizer Javed HackerOne Bugcrowd
blog.securitybreached.org · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A technical writeup of an Oracle SQL injection vulnerability discovered during a pentest/bug bounty, demonstrating a novel technique using pipe operators and string concatenation with the rownum function to bypass CASE() filtering and extract data like usernames despite character restrictions (underscore, parentheses, plus signs, dots, spaces).

pokleyzz yappare Oracle PostgreSQL IBM DB2 Informix
blog.yappare.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Researcher discovered an improper authorization vulnerability in HackerOne's Embedded Submission Form feature that allows bypassing both 2FA requirements and hacker blacklist restrictions when submitting bug reports to programs. The vulnerability affected the same authorization check, resulting in a $10,000 bounty ($2,500 initial + $7,500 for expanded scope).

HackerOne Japz Divino Parrot Security Ace Candelario Jobert (HackerOne Co-Founder)
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

An IDOR vulnerability in Facebook's video poll feature allowed attackers to delete polls from other users' videos by manipulating the deleted_poll_ids parameter in a POST request to the video edit endpoint. The vulnerability was reported in November 2018 and patched within days.

Facebook Dan Melamed Bugreader
bugreader.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A 2FA bypass vulnerability where improperly implemented rate limits could be bypassed using the X-Forwarded-For HTTP header, allowing attackers to brute-force TOTP codes. The vulnerability stems from the rate limit being based on manipulable HTTP headers rather than server-side session identifiers.

Yumi corb3nik Dashlane X-Forwarded-For MDN Web Docs
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Multi-stage vulnerability chain exploiting GitHub credential leaks, password pattern analysis, and CVE-2019-11580 in outdated Atlassian Crowd to achieve RCE and internal network access at a major ICT company. The attacker combined reconnaissance, Google dorking, and public exploits to breach the internal network perimeter.

CVE-2019-11580 Atlassian Crowd Github Th3g3nt3lman Bugcrowd University PayPal Xoom YoKo Kho
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Educational article explaining race condition vulnerabilities in web applications, particularly in financial systems, with real-world examples including the Starbucks gift card exploit where attackers could generate unlimited credit by sending concurrent transfer requests to bypass balance checks.

Egor Homakov Starbucks Vickie Li
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

Ron Chan discovered an SSRF vulnerability in Google Cloud Platform's Stackdriver Debug feature that allowed attackers to steal user OAuth access tokens from connected Git repositories (GitHub, GitLab, Bitbucket) by exploiting an unvalidated URL parameter that made SSRF requests with the victim's authorization headers.

Google Cloud Platform Stackdriver Debug Bitbucket GitLab GitHub Google App Engine Burp Collaborator Ron Chan Google VRP
ngailong.wordpress.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A detailed writeup of discovering and exploiting an SSRF vulnerability in a proxy endpoint by bypassing URL whitelist restrictions through subdomain enumeration, testing wildcard domain logic, discovering that amazonaws.com was whitelisted, and ultimately planning to use a custom domain (neemacompany.com) with DNS manipulation to bypass the whitelist validator.

Burp Collaborator Findomain httprobe Waybackurls AWS S3 EC2 Flask Ibram
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
0 7/10

A researcher discovered an SSRF vulnerability in a Jira instance and escalated it to local file read by chaining it with an internal GlassFish server exploit using double-URL encoding to bypass path traversal protections and read /etc/passwd.

Zain Sabahat Alyssa Herrera Jira GlassFish HackerTarget CVE reference to GlassFish exploit-db/39241
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 23 hours ago · details
more →