bugbounty技巧聚合20211122

漏洞报告

【Internet Bug Bounty 1,200刀】Ruby – Regular Expression Denial of Service Vulnerability of Date Parsing Methods
https://hackerone.com/reports/1404789

【Internet Bug Bounty 1,000刀】Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.50
https://hackerone.com/reports/1404731

【Azbuka Vkusa 150刀】Reflected XSS on av.ru via q parameter at https://av.ru/collections/*
https://hackerone.com/reports/965663

【Lark Technologies 1000刀】Non privileged user is able to approve his own app himself leading to mass privilege escalations
https://hackerone.com/reports/1168475

挖洞技巧

某汽车社区App 签名和加解密分析
https://mp.weixin.qq.com/s/QGFYvA6aw9CETr3pCYE62w

使用Microsoft Excel 读取本地文件
https://shubhamchaskar.com/excel-magic/

学习成长

关于学习方法与行动策略 @n1nty
https://mp.weixin.qq.com/s/7awZGcKFIUk8CZdaqXLytQ

文字来源于- 火线 Zone-云安全社区,安全小天地只做文章分享,如有侵权,请联系站长删除

© 版权声明
THE END
喜欢就支持一下吧
点赞8 分享
评论 抢沙发

请登录后发表评论

    请登录后查看评论内容