Writeups
Spotlight
Add Your Writeup
Blogs
Contact Us
Register
Login
Write-ups
Check The Published Writeups
Search
Reset
WDB
Title
Tags
Programs
Authors
Type
Publication
Added
3711
A Less Known Attack Vector, Second Order IDOR Attacks
IDOR
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-01-22
2023-06-13
3678
Simple Remote Code Execution Vulnerability Examples for Beginners
RCE
Unrestricted file upload
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-02-05
2023-06-13
3670
Weird Vulnerabilities Happening on Load Balancers, Shallow Copies and Caches
Information disclosure
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-02-11
2023-06-13
3644
Write-up: AWS Document Signing Security Control Bypass
AWS misconfiguration
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-02-26
2023-06-13
3602
Using Vulnerability Analytics Feature Like a Boss
SSRF
Reflected XSS
Authentication bypass
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-03-15
2023-06-13
3538
Google Maps API (Not the Key) Bugs That I Found Over the Years
Logic flaw
Google
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-04-19
2023-06-13
3218
Crowdsource Success Story: From an Out-of-Scope Open Redirect to CVE-2020-1323
Open redirect
Microsoft
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-08-14
2023-06-13
3012
Turning Blind Error Based SQL Injection into Exploitable Boolean One
SQL injection
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2020-11-21
2023-06-13
1820
BigQuery SQL Injection Cheat Sheet
SQL injection
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2022-02-14
2023-06-13
1023
Exploits Explained: 5 Unusual Authentication Bypass Techniques
Authentication bypass
JWT
CMS
SSO
NA
Ozgur Alp (@ozgur_bbh)
Bug Bounty
2022-09-28
2023-06-13