security-research

7 articles
Sort: New Top Best
clear filter
0 1/10
-
bragging-post

A portfolio/services page by security auditor Kiki showcasing 50+ smart contract audits and 15+ bug bounties across DeFi protocols, with client testimonials and links to published audit reports, primarily for lending/staking/perpetual trading protocols.

Kiki Enigma Dark Bail Security Guardian Audits Stable Jack Gloop Hyperdrive Camelot Silo Finance Arrakis Finance Ambit Finance GMX Synthetix Orderly Umami EigenLayer
github.com · Kiki · 4 hours ago · details
0
Eco
bug-bounty

A collection of blockchain security research and bug reports covering vulnerabilities in Oasys L2 blockchain, Eco's lockup contracts, and hybrid NFT attacks on Ocean Protocol. Multiple issues were identified and reported through Immunefi's bug bounty program.

Oasys Ethereum Immunefi Bandai Namco DoubleJump.japan Eco Ocean Protocol Merkle Bonsai
mirror.xyz · merkle_bonsai · 4 hours ago · details
0
vulnerability

A High Severity vulnerability was discovered in Across V3, a cross-chain optimistic bridge, that could allow malicious relayers to steal the full value of certain transactions from users by exploiting the relayer fulfillment mechanism prior to UMA Optimistic Oracle validation.

Across V3 zachobront deadrose UMA Optimistic Oracle
mirror.xyz · Zach Obront · 4 hours ago · details
0

A security researcher describes discovering and exploiting a Server-Side Request Forgery (SSRF) vulnerability using DNS rebinding techniques to bypass IP filtering, access AWS metadata endpoints, enumerate internal ports, and discover a buffer overread vulnerability in a Monit admin interface. The writeup details the exploitation chain and introduces dnsFookup, a GUI tool for automating DNS rebinding attacks.

CVE (Monit buffer overread) AWS Monit OpenSSH lock.cmpxchg8b.com/rebinder.html Fireshell CTF 2019 dnsFookup gel0.space
geleta.eu · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability-disclosure

Security researcher Josip Franjković discovered four SQL injection vulnerabilities across multiple Nokia domains (www4.nokia.de, a PHP site, and nokia.es subdomain), including blind SQL injection via User-Agent headers and time-based injection attacks, which Nokia's incident response team patched rapidly in April 2013. The researcher detailed advanced exploitation techniques such as using UNION-based subqueries with CASE statements to extract data from INSERT queries and bypass error-based detection.

Nokia www4.nokia.de nokia.es Josip Franjković Bryan de Houwer Nokia Lumia 820 Nokia Lumia 920 Instagram Ganglia
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability

MySQL clients can be abused via the LOAD DATA LOCAL INFILE feature to exfiltrate arbitrary files from the client machine by setting up a fake MySQL server that bypasses authentication and sends malicious payloads. This exploitation technique works because MySQL clients trust server-sent commands after authentication, allowing attackers to read sensitive files like /etc/hosts from compromised systems.

MySQL PHP 7.0.32 MySQL 8.0.13 MySQL 5.7.24
vesiluoma.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

A subdomain takeover vulnerability was discovered on Starbucks where an unclaimed CNAME pointing to a non-existent Azure Traffic Manager subdomain (s00149tmppcrpt.trafficmanager.net) could be hijacked by registering the Traffic Manager profile without domain ownership verification. The researcher was awarded a $2,000 bounty for this finding.

Starbucks Microsoft Azure Azure Traffic Manager wfmnarptpc.starbucks.com s00149tmppcrpt.trafficmanager.net trafficmanager.net Patrik Hudak
0xpatrik.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details