access-control-bypass

4 articles
sort: new top best
clear filter
0 3/10

Article discusses techniques and tools for bypassing HTTP 403 Forbidden responses to discover hidden endpoints during bug bounty hunting, using a tool called 403Bypasser.

403Bypasser
medium.com · ghostyjoe · 9 hours ago · details
0 7/10
incident-report

Scroll executed an emergency upgrade on April 25, 2025 to patch two critical vulnerabilities: a soundness bug in OpenVM 1.0.0's auipc opcode circuit (off-by-one in enumeration causing insufficient range checking) and a message spoofing vulnerability in the bridge's EnforcedTxGateway contract that could allow arbitrary token minting on L2.

Scroll OpenVM Axiom Immunefi WhiteHatMage Trail of Bits L1ScrollMessenger EnforcedTxGateway L2ScrollMessenger
forum.scroll.io · WhiteHatMage · 17 hours ago · details
0 8/10
vulnerability

Tokemak's liquidity controllers are vulnerable to token theft via pool ratio manipulation. An attacker with ADD_LIQUIDITY_ROLE can plant a malicious Uniswap/Sushi pair with an extreme token ratio, then trigger the deploy() function to cause the controller to deposit funds at that manipulated ratio, losing up to 100% of reserves through subsequent swaps exploiting the constant product formula.

Tokemak SushiswapControllerV2 UniswapController FOX ALCX Chainlink
trust-security.xyz · Trust · 17 hours ago · details
0 7/10

A CORS misconfiguration vulnerability where a website trusts all origins ending with a specific domain (e.g., evilredacted.com for redacted.com), allowing an attacker who registers a predomain wildcard subdomain to make authenticated requests and steal session credentials via JavaScript. The attacker registers a domain like kiraakredacted.com and crafts a malicious page that calls the /v1/user API endpoint with credentials enabled to extract user session IDs.

Arbaz Hussain HackerOne PortSwigger InfoSec Write-ups
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 17 hours ago · details