📅 11-Nov-2020
https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple
📅 16-Nov-2020
https://medium.com/@rezaduty/play-with-google-twitter-apple-dell-278c73ebde34
https://github.com/jas502n/CVE-2020-14882
https://medium.com/@estebancano/unique-xxe-to-aws-keys-journey-afe678989b2b
https://honoki.net/2018/12/12/from-blind-xxe-to-root-level-file-read-access/
📅 18-Nov-2020
https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae
https://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae
📅 20-Nov-2020
https://medium.com/@logicbomb_1/tale-of-3-vulnerabilities-to-account-takeover-44ba631a0304
https://0xgaurang.medium.com/out-of-band-xxe-in-an-e-commerce-ios-app-e22981f7b59b
📅 23-Nov-2020
https://r2c.dev/blog/2020/exploiting-dynamic-rendering-engines-to-take-control-of-web-apps/
📅 25-Nov-2020
https://medium.com/@ved_wayal/hail-frida-the-universal-ssl-pinning-bypass-for-android-e9e1d733d29
📅 30-Nov-2020
https://hackerone.com/reports/713285
https://portswigger.net/web-security/request-smuggling/finding
https://hackerone.com/reports/831962
https://hackerone.com/reports/1026585
https://hackerone.com/reports/1010835
https://www.veracode.com/blog/research/exploiting-spring-boot-actuators
Some Cool Writeups of IDOR Vulnerabilities 😎
- https://medium.com/@aysebilgegunduz/everything-you-need-to-know-about-idor-insecure-direct-object-references-375f83e03a87
- https://corneacristian.medium.com/top-25-idor-bug-bounty-reports-ba8cd59ad331
- https://medium.com/bugbountywriteup/all-about-getting-first-bounty-with-idor-849db2828c8
- https://medium.com/bugbountywriteup/a-short-story-of-idor-to-account-takeover-b36f3983ecba
- https://medium.com/@swapmaurya20/a-simple-idor-to-account-takeover-88b8a1d2ec24
- https://mustafakemalcan.com/insecure-direct-object-reference-idor-tips/
- https://medium.com/bugbountywriteup/pii-leakage-via-idor-weak-passwordreset-full-account-takeover-58d159f88d73
- https://medium.com/bugbountywriteup/a-short-story-of-idor-to-account-takeover-b36f3983ecba
- https://xploitprotocol.medium.com/hunt-for-the-idor-automation-using-burp-suit-a09f004a9d9d
- https://medium.com/@abhiunix/idor-on-api-endpoints-e08c740e87a2
- https://medium.com/@cobrabaghdad1/idor-lead-to-personally-identifiable-information-pii-leakage-fb2b1b4be93f
- https://www.youtube.com/watch?v=EjuDr5bLNek&ab_channel=AliT%C3%9CT%C3%9CNC%C3%9C
- https://www.youtube.com/watch?v=FPrNEv9a588&ab_channel=AliT%C3%9CT%C3%9CNC%C3%9C
📅 03-Dec-2020
https://dreamlab.net/en/blog/post/abusing-exposed-docker-registry-apis/