write-ups
How i found a Privilege Escalation via Impersonation Features featureHow I was able to discover ATO Via IDOR vulnerabilityEasy full Account Takeover via Facebook OAuth MisconfigurationHow I Escalated Simple HTML Injection to SSRF via PDF Rendering
PreviousLinux Privilege EscalationNextHow i found a Privilege Escalation via Impersonation Features feature
Last updated