bug-bounty457
google360
microsoft310
facebook264
xss250
apple176
malware175
rce165
exploit140
cve111
account-takeover104
bragging-post102
phishing84
privilege-escalation82
csrf81
supply-chain68
stored-xss65
authentication-bypass64
dos62
browser60
reflected-xss57
react52
cloudflare50
reverse-engineering49
access-control48
input-validation48
cross-site-scripting48
aws47
node46
docker46
smart-contract45
ethereum44
sql-injection43
defi43
web-security43
ssrf42
web342
web-application41
writeup37
oauth37
race-condition36
burp-suite35
info-disclosure34
idor34
vulnerability-disclosure34
auth-bypass33
cloud33
html-injection33
buffer-overflow32
smart-contract-vulnerability32
0
7/10
A researcher discovered a critical vulnerability chain in a multi-tenant business data management app: predictable, non-expiring invitation tokens with no signature protection allowed brute-forcing access to organizations, coupled with a secondary issue allowing visibility of pending admin invitations enabled full organizational takeover with minimal detection risk.
token-brute-force
account-takeover
privilege-escalation
organizational-takeover
invitation-system
weak-token-generation
enumeration
functional-vulnerability
access-control
business-logic-flaw
csrf-bypass
invitation-link-vulnerability
Plenum
InfoSec Write-ups
0
7/10
bug-bounty
A Time-Based SQL Injection vulnerability discovered in a forget password function of an ASP.NET application, exploited through single-quote escaping to break the SQL query and WAITFOR DELAY statements to exfiltrate database information using SQLMap automation.
sql-injection
time-based-sqli
forget-password
mssql
asp.net
sqlmap
burp-suite
enumeration
exploitation
bug-bounty
SQLMap
Burp Suite
MSSQL
ASP.NET