appsec.fyi · Sources

hackerone.com

33 curated AppSec resources from hackerone.com across 12 topics on appsec.fyi.

hackerone.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.

Date Added Resource Excerpt
2026-04-22 2026HackerOne: LLM01: Invisible Prompt InjectionAIProgram: HackerOne Severity: medium Weakness: LLM01: Prompt Injection ## Description Hey team, Hai is vulnerable to invisible prompt injection via Unicode tag characters. ## Reproduction steps 1. ...
2026-04-22 2026Internet Bug Bounty: Argo CD CSRF leads to Kubernetes cluster compromiseCSRFProgram: Internet Bug Bounty Severity: high Weakness: Cross-Site Request Forgery (CSRF) GHSA: https://github.com/argoproj/argo-cd/security/advisories/GHSA-92mw-q256-5vwg It's been publicly known for...
2026-04-19 2026Bykea: IDOR on In-App Hardcoded Zombie — HackerOneIDORBykea: IDOR on In-App Hardcoded Zombie — HackerOne
2026-04-19 2026IDOR Vulnerability — HackerOne Report 2633771IDORIDOR Vulnerability — HackerOne Report 2633771
2026-04-17 2026HackerOne #1210502: Jitsi Authentication Bypass (JWT)JWTHackerOne #1210502: Jitsi Authentication Bypass (JWT)
2026-04-17 2026HackerOne #2472798: Newspack Extended Access JWT bypassJWTHackerOne #2472798: Newspack Extended Access JWT bypass
2026-04-17 2026How an IDOR Vulnerability Led to User Profile Modification (HackerOne)IDORHow an IDOR Vulnerability Led to User Profile Modification (HackerOne)
2026-04-17 2026HackerOne Report #435066: SQL injection in GraphQL endpointGraphQLHackerOne Report #435066: SQL injection in GraphQL endpoint
2026-04-17 2026HackerOne Report #812064: SAML authentication bypass (Rocket.Chat)AuthNHackerOne Report #812064: SAML authentication bypass (Rocket.Chat)
2026-04-17 2026HackerOne Report #209008: Authentication Bypass - AutomatticAuthNHackerOne Report #209008: Authentication Bypass - Automattic
2026-04-17 2026HackerOne Report #423541: H1514 Server Side Template InjectionSSTIHackerOne Report #423541: H1514 Server Side Template Injection
2026-04-11 2026HackerOne #164224: SSTISSTIHackerOne #164224: SSTI
2026-04-11 2026HackerOne: Trint insecure client-side JWT generationJWTHackerOne: Trint insecure client-side JWT generation
2026-04-11 2026HackerOne: Linktree account takeover via improper JWT validationJWTHackerOne: Linktree account takeover via improper JWT validation
2026-04-11 2026HackerOne: Critical vulnerability in JWE SpecificationJWTHackerOne: Critical vulnerability in JWE Specification
2026-04-11 2026HackerOne: Argo CD JWT audience claim not verifiedJWTHackerOne: Argo CD JWT audience claim not verified
2026-04-11 2026Remitly: 0-Click Account Takeover (HackerOne)AuthNRemitly: 0-Click Account Takeover (HackerOne)
2026-04-10 2026Semrush OAuth redirect_uri bypass via IDN homograph — HackerOne #861940AuthNSemrush OAuth redirect_uri bypass via IDN homograph — HackerOne #861940
2026-04-10 2026Slack OAuth2 redirect_uri bypass — HackerOne #2575AuthNSlack OAuth2 redirect_uri bypass — HackerOne #2575
2026-04-10 2026HackerOne: SSRF in Exchange Leads to ROOT (Shopify)SSRFHackerOne: SSRF in Exchange Leads to ROOT (Shopify)
2026-04-10 2026HackerOne: SSRF Mitigation Bypass Using DNS Rebind AttackSSRFHackerOne: SSRF Mitigation Bypass Using DNS Rebind Attack
2026-04-10 2026HackerOne: SSRF in Search.gov via URL ParameterSSRFHackerOne: SSRF in Search.gov via URL Parameter
2026-04-10 2026HackerOne: SSRF via Analytics ReportsSSRFHackerOne: SSRF via Analytics Reports
2026-04-10 2026HackerOne Report: IDOR Allows ViewingIDORHackerOne Report: IDOR Allows Viewing
2026-04-10 2026XXE Complete Guide: Impact, Examples, and PreventionXXEXXE Complete Guide: Impact, Examples, and Prevention
2026-04-10 2026How a GraphQL Bug Resulted in Authentication BypassGraphQLHow a GraphQL Bug Resulted in Authentication Bypass
2026-04-10 2026How to Find XSS Vulnerabilities: Practical Security GuideXSSHow to Find XSS Vulnerabilities: Practical Security Guide
2026-04-06 2026HackerOne HacktivityBug BountyHackerOne Hacktivity
2026-04-03 2026How a Cross-Site Scripting Vulnerability Led to Account Takeover | HackerOneXSSHow a Cross-Site Scripting Vulnerability Led to Account Takeover | HackerOne
2026-04-03 2026How To Find Broken Access Control Vulnerabilities in the Wild | HackerOneAuthZHow To Find Broken Access Control Vulnerabilities in the Wild | HackerOne
2025-08-14 2025SSRF in https://couriers.indrive.com/api/file-storageSSRFProgram: inDrive Severity: high Weakness: Server-Side Request Forgery (SSRF) ## Summary: SSRF in ` url ` parameter in https://couriers.indrive.com/api/file-storage ## Steps To Reproduce: I will tr...
2025-08-14 2025Full Read SSRF on Gitlab's Internal GrafanaSSRFProgram: GitLab Severity: critical Weakness: Server-Side Request Forgery (SSRF) Apparently, Grafana is bundled with Gitlab by default. So the grafana instance that is accessible via `/-/grafana/`is v...
2023-02-14 2023How To: Server-Side Request Forgery (SSRF)SSRFThe content discusses Server-Side Request Forgery (SSRF) and provides a guide on how to perform it. SSRF is a vulnerability that allows attackers to make requests from a server, potentially accessing sensitive information or executing malicious actions. The guide likely includes techniques and examples of exploiting SSRF vulnerabilities. It is crucial for developers and security professionals to understand SSRF to prevent and mitigate such attacks.