Category: Bug Bounty


  • From Zero to Hero Part 2: From SQL Injection to RCE on Intel DCM (CVE-2022-21225)

    From Zero to Hero Part 2: From SQL Injection to RCE on Intel DCM (CVE-2022-21225)

    /

  • From Zero to Hero Part 1: Bypassing Intel DCM’s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)

    From Zero to Hero Part 1: Bypassing Intel DCM’s Authentication by Spoofing Kerberos and LDAP Responses (CVE-2022-33942)

    /

  • WordPress Transposh: Exploiting a Blind SQL Injection via XSS

    WordPress Transposh: Exploiting a Blind SQL Injection via XSS

    /

  • Smuggling an (Un)exploitable XSS

    Smuggling an (Un)exploitable XSS

    /

  • Bug Bounty Platforms vs. GDPR: A Case Study

    /

  • H1-4420: From Quiz to Admin – Chaining Two 0-Days to Compromise An Uber WordPress

    /

  • About a Sucuri RCE…and How Not to Handle Bug Bounty Reports

    /

  • Dell KACE K1000 Remote Code Execution – the Story of Bug K1-18652

    /

  • H1-3120: MVH! (H1 Event Guide for Newbies)

    /

  • H1-415: Hacking My Way Into the Top 4 of the Day

    /