Some of the vulnerailities are explained here, take a look down here
https://honoki.net/2020/02/18/http-request-smuggling-5-practical-tips/
https://buer.haus/2017/06/29/escalating-xss-in-phantomjs-image-rendering-to-ssrflocal-file-read/
https://www.hahwul.com/phoenix/ssrf-open-redirect
https://hackerone.com/reports/978680
https://medium.com/@pratiky054/html-injection-unique-exploitation-a5c3d4e6fed8 https://footstep.ninja/posts/html-injection-in-email/
https://blog.dixitaditya.com/leveraging-xss-to-read-internal-files/amp/?__twitter_impression=true
https://medium.com/@mrnikhilsri/unauthenticated-account-takeover-through-http-leak-33386bb0ba0b
http://www.kamilonurozkaleli.com/posts/starbucks-singapore-account-takeover/
https://rootsploit.com/exploiting-csrf-on-json-endpoint-w-o-flash/#comment-5
(Note: Rootsploit has plenty of posts for Bug Bounty Writeups)
https://rootsploit.com/
https://medium.com/@sechunter/js-is-love-%EF%B8%8F-ca393a4849e9
https://medium.com/@sechunter/exploiting-admin-panel-like-a-boss-fc2dd2499d31
https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142
https://medium.com/intigriti/how-i-hacked-hundreds-of-companies-through-their-helpdesk-b7680ddc2d4c
https://saadahmedx.medium.com/weaponizing-xss-for-fun-profit-a1414f3fcee9
https://medium.com/bugbountywriteup/hacking-http-cors-from-inside-out-512cb125c528 HTTP Request Smuggling https://blog.cobalt.io/a-pentesters-guide-to-http-request-smuggling-8b7bf0db1f0
https://blog.orange.tw/2020/09/how-i-hacked-facebook-again-mobileiron-mdm-rce.html?m=1
https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html
https://bugreader.com/ahmad_halabi@idor-sql-query-manipulation-to-fetch-user-details-228
---------------------------------------------------------- 👉 Back to Main Page 👈 ----------------------------------------------------------