Skip to the content
Hacktive Security Blog
  • Pin Posts
  • Home
  • 2021

2021

0
0
Intigriti XSS Challenge – December 2021
Application Security

Intigriti XSS Challenge – December 2021

Michele Mariani
December 27, 2021March 11, 2022
The approach to this challenge was completely different from the past two months, as the vulnerable component was on the backend, forcing us to approach...
Read More
0
2
Intigriti November XSS Challenge
Application Security

Intigriti November XSS Challenge

Michele Mariani
November 22, 2021March 11, 2022
The bug bounty program Intigriti hosts an XSS challenge every month. This time, the challenge was about bypassing CSP by reloading a VueJS instance, getting...
Read More
0
3
Application Security

CVE-2021-43136 – FormaLMS – The evil default value that leads to Authentication Bypass

Cristian Giustini
October 5, 2021January 1, 2022
Preface As part of our recent research activity, we stumbled upon FormaLMS. The project is an open source Learning Management System built by forma.association and...
Read More
0
0
SA-CONTRIB-2021-036 NotSoSAML – Privilege Escalation via XML Signature Wrapping on MiniorangeSAML Drupal Plugin
Application Security

SA-CONTRIB-2021-036 NotSoSAML – Privilege Escalation via XML Signature Wrapping on MiniorangeSAML Drupal Plugin

Cristian Giustini
July 9, 2021January 18, 2022
This is a brief story about how we found a vulnerability on a drupal plugin that, when not configured correctly, could allow an authenticated user...
Read More
0
0
CVE-2020-35749 – Authenticated Directory Traversal Simple Job Board WordPress plugin version < 2.9.3
Application Security

CVE-2020-35749 – Authenticated Directory Traversal Simple Job Board WordPress plugin version < 2.9.3

Arcangelo Saracino
January 18, 2021June 27, 2021
During our research activities we discovered an authenticated local inclusion in the Simple Job Board Wordpress plugin. The Simple Job Board Wordpress plugin has reached...
Read More

Recent Post

CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF

Lock Picking – Part 1

How an Akamai misconfiguration earned us USD 46.000

Workshop: Linux Kernel Exploitation 101 – Part 2

Workshop: Linux Kernel Exploitation 101 – Part 1

Top Category

Application Security

Mobile

Exploitation

  • Pin Posts
Copyright © 2023 Hacktive Security Blog. All rights reserved.
Theme: Masonry Grid By Themeinwp. Powered by WordPress.
To the Top ↑ Up ↑