Web Bug Bounty
Account Takeover Via HTML Injection
(Feb-2023)This flaw allowed malicious actors to manipulate the content of the email, leading to a dangerous exploit known as "one-click account takeover." By injecting malicious HTML code into the password reset email, attackers could gain unauthorized access to user accounts with just a single click on a seemingly legitimate link.
HTML Injection on Mail
(July-2023)A website featured a form that collected user information, including first name, last name, and email. Unfortunately, the input fields for first name and last name were found to be vulnerable to HTML injection. This vulnerability allowed attackers to inject malicious HTML code, which was then reflected in the email received by the user.
Rate Limit Bypass
(Aug-2023)Rate-limit protection is a fundamental defense mechanism that prevents abuse and unauthorized access by limiting the number of requests a user or entity can make within a specified time frame. However, certain flaws in its implementation can be exploited, potentially allowing attackers to bypass
OTP Verification Bypass
(Aug-2021)Exploiting response manipulation to bypass OTP verification poses a critical security concern. By tampering with the response and replacing error messages with manipulated data, attackers can deceive the system into accepting invalid OTPs.
Sensitive Data Exposure via Graphql
(Dec-2023)Enabling introspection queries in GraphQL APIs without stringent security measures poses a significant risk of sensitive data leakage. Unauthorized access, data enumeration, and information disclosure can occur, allowing attackers to exploit schema details for malicious purposes. Implementing access controls, query whitelisting, and rate limiting is crucial to mitigate these vulnerabilities.
IDOR
(Dec-2022)Insecure Direct Object Reference (IDOR) exposes a vulnerability where attackers can delete data by manipulating identifiers. This flaw occurs when access controls and proper validation checks are lacking. Regular security audits and testing are essential to identify and rectify potential IDOR vulnerabilities, safeguarding the integrity and confidentiality of user data.
Improper Access Control
(Dec-2023)This flaw enables improper access control on files, allowing restricted users to read the content of files, thereby causing significant issues in the application. This vulnerability may arise from misconfigured access controls, bypassed authentication mechanisms, or other flaws in the authorization process.
Account Takeover via CSRF
(October-2023)The vulnerability centers around the "Edit Profile" feature, a commonly implemented component in websites and applications allowing users to modify their account details. In this scenario, the attacker employs CSRF techniques to force the victim's account to update the associated email address without the user's knowledge or consent.
Android Bug Bounty
WebViewActivity Exploit
A WebView exploit involves a security flaw in mobile apps utilizing WebView components, allowing attackers to manipulate URLs for redirection. This vulnerability poses risks such as phishing and delivery of malicious content. The redirection vulnerability, where malicious actors can manipulate URLs to redirect users to phishing sites or other malicious destinations.
Sensitive Data Exposure via Firebase
Most of the modern applications utilize Firebase to store data. Misconfigurations in Firebase can lead to issues related to both read and write access. These misconfigurations may inadvertently expose sensitive data or allow unauthorized parties to modify the database. Ensuring proper Firebase security configurations is crucial to prevent such vulnerabilities and safeguard the integrity and confidentiality of stored information.