Title Tags Author Publication Date Added Date
Stored XSS Filter Bypass in the Skills section XSS Krishna Kumar 2023-08-16 2025-04-08
Blind SSRF - The Tray Blind SSRF p4n7h3rx 2023-07-29 2025-04-08
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel ATO, 2FA Bypass, PII, RCE Sam Curry 2025-01-23 2025-04-09
Hacking Kia: Remotely Controlling Cars With Just a License Plate PII, RCE Sam Curry 2024-09-20 2025-04-09
Request Smuggling Exposes JWT — Enables 0-Click ATO! Request Smuggling, ATO Omar Alzughaibi 2024-04-09 2025-04-09
Client-side RCE via symlink following in Google Web Designer for macOS/Linux: CVE-2025-1079 RCE Bálint Magyar 2024-04-02 2025-04-09
Let's Talk About Encryption And IDORs (Yes, IDORs Again) IDOR bombon (@bxmbn) 2025-02-23 2025-04-10
Hijacking Sessions with IDOR and XSS XSS, ATO bombon (@bxmbn) 2025-02-23 2025-04-10
A successful prototype pollution chained to a DOM XSS XSS, Prototype Pollution Rachid.A (@zhero___) 2023-04-10 2025-04-10
$175 Prototype Pollution Vulnerability – Public program Prototype Pollution 1day 2024-10-02 2025-04-10
What is prototype poisoning? Prototype bugs explained! Prototype Poisoning Christoffer Jerkeby 2022-09-14 2025-04-10
Remote code execution (RCE) 101 RCE, AEM DK999 2025-03-26 2025-04-11
Cache Deception on my new site! Cache Deception Jorian (@J0R1AN) 2025-03-29 2025-04-12
Bypassing WAFs to Exploit CSPT Using Encoding Levels CSPT, WAF Matan Berson (@MtnBer) 2024-05-10 2025-04-12
Bidding Like a Billionaire - Stealing NFTs With 4-Char CSTIs CSTI Matan Berson (@MtnBer) 2024-07-11 2025-04-12
Privilege Escalation via Manipulation of Account Attributes Privilege Escalation 0xBen 2025-04-12 2025-04-14
2 Idors allowed me to upload , modify and see victim’s Data IDOR 0xBen 2025-02-02 2025-04-14
How I Found RCE (Remote Code Execution) via File Upload RCE, File Upload Akash A 2024-09-08 2025-04-14
How We Hacked a Software Supply Chain for $50K Supply Chain Roni Carta, Lupin 2025-02-15 2025-04-15
I Studied 100+ SSRF Reports, and Here’s What I Learned SSRF Aditya Sawant 2024-10-06 2025-04-16
Digging for SSRF in NextJS apps SSRF Adam Kues, Shubham Shah 2024-05-09 2025-04-16
SSRF (Server Side Request Forgery) worth $4,913 | My Highest Bounty Ever ! SSRF Sayaan Alam 2020-11-10 2025-04-16
blind-ssrf-chains SSRF Assetnote 2021-01-14 2025-04-16
A recap of the Q&A session on Twitter SSRF Agarri 2021-04-23 2025-04-16
Unveiling Hidden Treasures: How Analyzing JavaScript Files Led Me to Tokens and Secret Keys Credential Dislosure 0xBen 2025-04-12 2025-04-16
HTTP header hacks: basic and advanced exploit techniques explored HTTP Header Attacks YesWeHack 2025-04-15 2025-04-17
CPDoS CPDoS Luigi Lo Iacono, Hoai Viet Nguyen 2019-11-14 2025-04-17
0-Click Mass Account Takeover via Password Reset Functionality Password Reset, ATO 0d_samii 2024-09-08 2025-04-19
Easy P1: Unlocking Pro & Enterprise Features via Developer Tools (Inspect) due to insufficient server-side validation Broken Access 0d_samii 2024-10-17 2025-04-19
Authentication - shared-secret-key Authentication Osb0rn3 2024-09-17 2025-04-19
Authentication - oauth-scope Authentication Osb0rn3 2024-09-20 2025-04-19
Common OAuth Vulnerabilities OAuth doyensec 2025-01-30 2025-04-20
Traveling with OAuth — Account Takeover on Booking.com OAuth Aviad Carmel 2023-03-02 2025-04-20
Cross-Site WebSocket Hijacking Exploitation in 2025 WebSocket Laurence Tennant 2025-04-17 2025-04-22
Exploiting Client-Side Path Traversal to Perform Cross-Site Request Forgery - Introducing CSPT2CSRF CSPT doyensec 2024-07-02 2025-04-23
How I made $64k from deleted files — a bug bounty story Information Disclosure Sharon Brizinov 2025-04-23 2025-04-24
The power of Client-Side Path Traversal: How I found and escalated 2 bugs through “../” CSPT, XSS Alvaro Balada 2024-01-01 2025-04-29
XSS Marks the Spot: Digging Up Vulnerabilities in ChatGPT XSS Ron Masas 2024-02-19 2025-04-29
Hacking Microsoft and Wix with Keyboard Shortcuts XSS Ron Masas 2024-02-15 2025-04-29
Breaking OTPs in the Real World: How Design Flaws Led to Full Account Takeover OTP Bypass Huntsman 2025-05-02 2025-05-03
Google Cloud Account Takeover via URL Parsing Confusion OAuth Mohamed Benchikh 2025-04-29 2025-05-03
Exploiting XSS with 20 characters limitation XSS marektoth 2020-08-23 2025-05-03
Why XSS Persists in This Frameworks Era? XSS canalun (@i_am_canalun) 2025-07-08 2025-07-16
GMSGadget Gadget kevin-mizu (@kevin_mizu) 2025-07-21 2025-07-26
ChatGPT Account Takeover - Wildcard Web Cache Deception Cache Deception harel (@h4r3l) 2024-02-04 2025-07-26
Netflix Vulnerability: Dependency Confusion in Action Dependency Confusion Roni Carta & Lupin 2025-06-10 2025-07-26
How XBOW turned a JavaScript hint into a working file inclusion LFI Nico Waisman 2025-07-21 2025-07-26
The campaign is not available in your country: XBOW discovered an SQLi while attempting to bypass geolocation restrictions. SQLi Nico Waisman 2025-07-31 2025-08-01
Wiz Research Uncovers Critical Vulnerability in AI Vibe Coding platform Base44 Allowing Unauthorized Access to Private Applications Authorization Gal Nagli 2025-07-29 2025-08-01