CVE-2024-8698: Privelege Escalation in Keycloak, 7.7 ratingโ๏ธ
Improper SAML signature verification allows an attacker to create a document that is only partially signed. Due to the vulnerability, the entire document will be considered signed, which may lead to privelege escalation.
Search at Netlas.io:
๐ Link: https://nt.ls/LJfRK
๐ Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676
Read more: https://access.redhat.com/security/cve/CVE-2024-8698
Improper SAML signature verification allows an attacker to create a document that is only partially signed. Due to the vulnerability, the entire document will be considered signed, which may lead to privelege escalation.
Search at Netlas.io:
๐ Link: https://nt.ls/LJfRK
๐ Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676
Read more: https://access.redhat.com/security/cve/CVE-2024-8698
โค1
โกTOP 100 Vulnerabilities Step-by-Step Guide Handbook
https://github.com/Zorono/Learning-PDFs/blob/main/TOP%20100%20Vulnerabilities%20Step-by-Step%20Guide%20Handbook.pdf
https://github.com/Zorono/Learning-PDFs/blob/main/TOP%20100%20Vulnerabilities%20Step-by-Step%20Guide%20Handbook.pdf
GitHub
Learning-PDFs/TOP 100 Vulnerabilities Step-by-Step Guide Handbook.pdf at main ยท Zorono/Learning-PDFs
Contribute to Zorono/Learning-PDFs development by creating an account on GitHub.
โค12๐ณ1๐ฟ1
CVE-2024-47062: SQL Injection and Auth Bypass in Navidrome Music Server, 9.4 rating ๐ฅ
The latest advisory disclosed several vulnerabilities, which in theory allow an attacker to gain access to sensitive data.
Search at Netlas.io:
๐ Link: https://nt.ls/N9Jj8
๐ Dork: http.description:"Navidrome Music Server"
Vendor's advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-58vj-cv5w-v4v6
The latest advisory disclosed several vulnerabilities, which in theory allow an attacker to gain access to sensitive data.
Search at Netlas.io:
๐ Link: https://nt.ls/N9Jj8
๐ Dork: http.description:"Navidrome Music Server"
Vendor's advisory: https://github.com/navidrome/navidrome/security/advisories/GHSA-58vj-cv5w-v4v6
๐4
โก๏ธGoogle Dorks - Vulnerable Parameters โก๏ธ
โ๏ธXSS prone parameters:
inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example[.]com
โ๏ธOpen Redirect prone parameters
inurl:url= | inurl:return= | inurl:next= | inurl:redirect= | inurl:redir= | inurl:ret= | inurl:r2= | inurl:page= inurl:& inurl:http site:example[.]com
โ๏ธSQLi Prone Parameters
inurl:id= | inurl:pid= | inurl:category= | inurl:cat= | inurl:action= | inurl:sid= | inurl:dir= inurl:& site:example[.]com
โ๏ธSSRF Prone Parameters
inurl:http | inurl:url= | inurl:path= | inurl:dest= | inurl:html= | inurl:data= | inurl:domain= | inurl:page= inurl:& site:example[.]com
โ๏ธLFI Prone Parameters
inurl:include | inurl:dir | inurl:detail= | inurl:file= | inurl:folder= | inurl:inc= | inurl:locate= | inurl:doc= | inurl:conf= inurl:& site:example[.]com
โ๏ธRCE Prone Parameters
inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com
๐ Credit- Mike Takashi
โ๏ธXSS prone parameters:
inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& site:example[.]com
โ๏ธOpen Redirect prone parameters
inurl:url= | inurl:return= | inurl:next= | inurl:redirect= | inurl:redir= | inurl:ret= | inurl:r2= | inurl:page= inurl:& inurl:http site:example[.]com
โ๏ธSQLi Prone Parameters
inurl:id= | inurl:pid= | inurl:category= | inurl:cat= | inurl:action= | inurl:sid= | inurl:dir= inurl:& site:example[.]com
โ๏ธSSRF Prone Parameters
inurl:http | inurl:url= | inurl:path= | inurl:dest= | inurl:html= | inurl:data= | inurl:domain= | inurl:page= inurl:& site:example[.]com
โ๏ธLFI Prone Parameters
inurl:include | inurl:dir | inurl:detail= | inurl:file= | inurl:folder= | inurl:inc= | inurl:locate= | inurl:doc= | inurl:conf= inurl:& site:example[.]com
โ๏ธRCE Prone Parameters
inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com
๐ Credit- Mike Takashi
๐13โค4๐ฅ4
Media is too big
VIEW IN TELEGRAM
๐Hacking Kia: Remotely Controlling Cars With Just a License PlateNew writeup from Specters and Sam Curry: They were finally allowed to disclose a vulnerability reported to Kia that could have allowed an attacker to remotely control nearly all vehicles made after 2013, using only the license plate.
Full Blog: https://samcurry.net/hacking-kia
Full Blog: https://samcurry.net/hacking-kia
๐3โค2
https://leak.sx
https://scylla.sh
https://intelx.io
https://4iq.com
https://leaked.site
https://hashes.org
https://leakcheck.io
https://vigilante.pw
https://leakcheck.net
https://weleakinfo.to
https://leakcorp.com
https://leakpeek.com
https://rslookup.com
https://snusbase.com
https://ghostproject.fr
https://leakedsource.ru
https://leak-lookup.com
https://nuclearleaks.com
https://private-base.info
https://haveibeensold.app
https://breachchecker.com
https://dehashed.com
https://scatteredsecrets.com
https://haveibeenpwned.com
https://haveibeenpwned.com
https://services.normshield.com
https://joe.black/leakengine.html
Please open Telegram to view this post
VIEW IN TELEGRAM
leak.sx
Leak.sx | Homepage | best source for hacking tools.
Leak.sx - The best leaked accounts website, Homepage, free combo tool, ai image generator, roblox free roblox accounts, free membership for netflix,Minecraft account generator.
๐7โค4๐ฅ3
Methods that no one tells u to find origin ip addresses!!!???
https://forums.cybershieldctf.com/search.php?action=results&sid=3e360b4b477968060184d73068b9f841
#bugbounty #bugbountytips
https://forums.cybershieldctf.com/search.php?action=results&sid=3e360b4b477968060184d73068b9f841
#bugbounty #bugbountytips
โค4๐1๐ฅ1
Brut Security
Methods that no one tells u to find origin ip addresses!!!??? https://forums.cybershieldctf.com/search.php?action=results&sid=3e360b4b477968060184d73068b9f841 #bugbounty #bugbountytips
Usually CI CD integrations are not protected by wafs and reverse proxies, so if you find any small organization's gitlab, jenkin instance etc you'll often find configurations files (from wayback machine, previous commit too +a lot of ways) , they often leak some ip addresses
๐ฅ3โค2๐1
โก ffufai is an AI-powered wrapper for the popular web fuzzer ffuf. It automatically suggests file extensions for fuzzing based on the target URL and its headers, using either OpenAI's GPT or Claude AI models.
๐https://github.com/jthack/ffufai
๐https://github.com/jthack/ffufai
๐9
Authorization bypass due to cache misconfiguration???
https://forums.cybershieldctf.com/search.php?action=getnew
#bugbounty #bugbountytips
https://forums.cybershieldctf.com/search.php?action=getnew
#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ฅ6๐3๐ฟ3โค1