<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>LogicalBreach Academy Feed</title>
        <link>https://academy.logicalbreach.com/</link>
        <description>Latest bug bounty writeups, tools and security cheatsheets</description>
        <language>en-us</language>
        <lastBuildDate>Wed, 22 Apr 2026 03:25:23 GMT</lastBuildDate>
        <atom:link href="https://academy.logicalbreach.com//api/rss" rel="self" type="application/rss+xml" />
        
        <item>
            <title><![CDATA[SVG filter primitives bypass remote image blocking, enabling email tracking without consent.]]></title>
            <link>https://academy.logicalbreach.com//writeups/svg-filter-primitives-bypass-remote-image-blocking-enabling-email-tracking-without-consent-ec314c70</link>
            <guid isPermaLink="false">13394821-a6ab-4e65-ac0f-75998a014b2f</guid>
            <pubDate>Tue, 21 Apr 2026 10:37:21 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3486747 by nullcathedral]]></description>
        </item>
        <item>
            <title><![CDATA[position: fixed !important bypasses CSS sanitizer's fixed-position mitigation, enabling full-viewport phishing overlays.]]></title>
            <link>https://academy.logicalbreach.com//writeups/position-fixed-important-bypasses-css-sanitizer-s-fixed-position-mitigation-enabling-full-viewport-phishing-overlays-f5ab530c</link>
            <guid isPermaLink="false">4dd5d5e5-a841-4a6d-99d3-986049f34af8</guid>
            <pubDate>Tue, 21 Apr 2026 10:36:27 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3590586 by nullcathedral]]></description>
        </item>
        <item>
            <title><![CDATA[Unquoted body background attribute enables CSS injection that bypasses remote image blocking]]></title>
            <link>https://academy.logicalbreach.com//writeups/unquoted-body-background-attribute-enables-css-injection-that-bypasses-remote-image-blocking-e9c47a31</link>
            <guid isPermaLink="false">9bd9b3fb-019f-47aa-97a8-9f609c776a04</guid>
            <pubDate>Tue, 21 Apr 2026 10:35:00 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3590583 by nullcathedral]]></description>
        </item>
        <item>
            <title><![CDATA[SMIL values and by attributes bypass remote image blocking via unvalidated resource-loading animations, enabling email tracking without consent]]></title>
            <link>https://academy.logicalbreach.com//writeups/smil-values-and-by-attributes-bypass-remote-image-blocking-via-unvalidated-resource-loading-animations-enabling-email-tracking-without-consent-8262eb80</link>
            <guid isPermaLink="false">f03edaf9-201f-486f-826e-2a54f11263d8</guid>
            <pubDate>Tue, 21 Apr 2026 10:34:03 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3590576 by nullcathedral]]></description>
        </item>
        <item>
            <title><![CDATA[Stored XSS in attachment-display exploitable through SameSite]]></title>
            <link>https://academy.logicalbreach.com//writeups/stored-xss-in-attachment-display-exploitable-through-samesite-5b3d5697</link>
            <guid isPermaLink="false">9995cab9-4459-441e-a604-a5daec9c0604</guid>
            <pubDate>Tue, 21 Apr 2026 10:33:04 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3594137 by aikido_security]]></description>
        </item>
        <item>
            <title><![CDATA[DOM XSS to High Severity via Credential Phishing Overlay]]></title>
            <link>https://academy.logicalbreach.com//writeups/dom-xss-to-high-severity-via-credential-phishing-overlay-df9c3034</link>
            <guid isPermaLink="false">c7f521c5-c007-4816-bb02-3b630469012b</guid>
            <pubDate>Sun, 19 Apr 2026 14:17:51 GMT</pubDate>
            <description><![CDATA[A DOM-based XSS vulnerability was discovered affecting multiple endpoints within a financial institution's web application. The target_route parameter was being processed client-side without proper validation or sanitization. This flaw allowed an attacker to execute arbitrary JavaScript code by utilizing the javascript: URI scheme.]]></description>
        </item>
        <item>
            <title><![CDATA[Rails::HTML::Sanitizer.allowed_uri? returns true for entity-encoded control-character-split javascript: URLs]]></title>
            <link>https://academy.logicalbreach.com//writeups/rails-html-sanitizer-allowed-uri-returns-true-for-entity-encoded-control-character-split-javascript-urls-6e802bf8</link>
            <guid isPermaLink="false">af4333fc-f811-4114-bca9-be4ca1c241a9</guid>
            <pubDate>Sun, 19 Apr 2026 08:58:50 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3601655 by smlee]]></description>
        </item>
        <item>
            <title><![CDATA[Residual Malicious Payloads on HackerOne after Vulnerability Fixes]]></title>
            <link>https://academy.logicalbreach.com//writeups/residual-malicious-payloads-on-hackerone-after-vulnerability-fixes-c8bf3f6a</link>
            <guid isPermaLink="false">97ff78c7-6228-467a-8fa4-b2c6d8edfbc0</guid>
            <pubDate>Sat, 18 Apr 2026 10:19:54 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3168691 by joejoe5]]></description>
        </item>
        <item>
            <title><![CDATA[DOS via Mutation Aliasing in GraphQL Account Recovery Phone Number Verification API]]></title>
            <link>https://academy.logicalbreach.com//writeups/dos-via-mutation-aliasing-in-graphql-account-recovery-phone-number-verification-api-b3ded1f5</link>
            <guid isPermaLink="false">bdec170a-1fae-4b2d-be1d-0cf4bea01af7</guid>
            <pubDate>Sat, 18 Apr 2026 10:17:29 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3287208 by hellokbit]]></description>
        </item>
        <item>
            <title><![CDATA[DOM XSS in `fizzy.do` import filename preview enables one-click victim account takeover]]></title>
            <link>https://academy.logicalbreach.com//writeups/dom-xss-in-fizzy-do-import-filename-preview-enables-one-click-victim-account-takeover-e52cba0f</link>
            <guid isPermaLink="false">09d5bb71-0811-4139-9219-50bb98a7f01c</guid>
            <pubDate>Sat, 18 Apr 2026 10:10:55 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3608199 by xavlimsg]]></description>
        </item>
        <item>
            <title><![CDATA[Improper Access Control in `fizzy.do` import flow allows cross-tenant ActionText reference resolution and data disclosure]]></title>
            <link>https://academy.logicalbreach.com//writeups/improper-access-control-in-fizzy-do-import-flow-allows-cross-tenant-actiontext-reference-resolution-and-data-disclosure-1271160b</link>
            <guid isPermaLink="false">ca76dbce-a475-4127-94e3-f48feee7f389</guid>
            <pubDate>Sat, 18 Apr 2026 10:08:57 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3543475 by xavlimsg]]></description>
        </item>
        <item>
            <title><![CDATA[Brave Shields Domain Reordering Leads to Origin Confusion]]></title>
            <link>https://academy.logicalbreach.com//writeups/brave-shields-domain-reordering-leads-to-origin-confusion-0201d210</link>
            <guid isPermaLink="false">5605615a-c949-42ae-b181-668ee1a8e691</guid>
            <pubDate>Sat, 18 Apr 2026 10:06:14 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3665151 by mousepadkalilinux12]]></description>
        </item>
        <item>
            <title><![CDATA[Credential Disclosure via Unvalidated directDownloadUrl (Missing DontAddCredentialsAttribute)]]></title>
            <link>https://academy.logicalbreach.com//writeups/credential-disclosure-via-unvalidated-directdownloadurl-missing-dontaddcredentialsattribute-d97535ec</link>
            <guid isPermaLink="false">b9f907b5-0223-4830-82f8-1d98d084bd5f</guid>
            <pubDate>Sat, 18 Apr 2026 10:03:37 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3400143 by py0zz1]]></description>
        </item>
        <item>
            <title><![CDATA[[Duplicate] Open Redirect Flow Abuse via OAuth Validation Bypass]]></title>
            <link>https://academy.logicalbreach.com//writeups/duplicate-open-redirect-flow-abuse-via-oauth-validation-bypass-32d63048</link>
            <guid isPermaLink="false">d6a29801-290c-41cf-95c6-10dc58ae9b5a</guid>
            <pubDate>Sat, 11 Apr 2026 18:03:51 GMT</pubDate>
            <description><![CDATA[A Open Redirect vulnerability was identified within an OAuth authorization flow endpoint. The vulnerability occurs because the callback_url (or equivalent redirect parameter) is validated using an insecure string prefix match instead of exact parsing.]]></description>
        </item>
        <item>
            <title><![CDATA[[Duplicate] Reflected XSS to Account Takeover (Credential Hijacking)]]></title>
            <link>https://academy.logicalbreach.com//writeups/duplicate-reflected-xss-to-account-takeover-credential-hijacking-6df42df2</link>
            <guid isPermaLink="false">9a055de6-cbba-4607-a43e-1b3c32351c0d</guid>
            <pubDate>Sat, 11 Apr 2026 17:59:00 GMT</pubDate>
            <description><![CDATA[A critical Reflected Cross-Site Scripting (XSS) vulnerability was discovered in a captive WiFi portal, allowing an unauthenticated attacker to steal the credentials of any user connecting via a malicious URL.]]></description>
        </item>
        <item>
            <title><![CDATA[[Vertical Privilege Escalation] User can Unapproved any Approved Translation at [/translations/unapprove/]]]></title>
            <link>https://academy.logicalbreach.com//writeups/vertical-privilege-escalation-user-can-unapproved-any-approved-translation-at-translations-unapprove-6ac102c0</link>
            <guid isPermaLink="false">78a600af-3cb1-4c16-8ba2-85dfc43abbf6</guid>
            <pubDate>Sat, 11 Apr 2026 16:52:28 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3020021 by adilnbabras]]></description>
        </item>
        <item>
            <title><![CDATA[User Can Delete Other Users' Personal Access Tokens at /delete-token/{token_id}/ on Mozilla Pontoon]]></title>
            <link>https://academy.logicalbreach.com//writeups/user-can-delete-other-users-personal-access-tokens-at-delete-token-token-id-on-mozilla-pontoon-441a5866</link>
            <guid isPermaLink="false">2be31f50-e68d-47b5-8c66-32154817b0ec</guid>
            <pubDate>Sat, 11 Apr 2026 16:52:03 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3325582 by adilnbabras]]></description>
        </item>
        <item>
            <title><![CDATA[Unauthorized usage of External API Key (Usage of Google Maps API Key ==> $$$]]></title>
            <link>https://academy.logicalbreach.com//writeups/unauthorized-usage-of-external-api-key-usage-of-google-maps-api-key-f5da9c47</link>
            <guid isPermaLink="false">69873175-251a-429a-b851-d16446113521</guid>
            <pubDate>Wed, 08 Apr 2026 09:36:23 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/881118 by avielt]]></description>
        </item>
        <item>
            <title><![CDATA[DLL side-loading vulnerability in Sony Music Center for PC Ver. 2.7.2 (Latest version)]]></title>
            <link>https://academy.logicalbreach.com//writeups/dll-side-loading-vulnerability-in-sony-music-center-for-pc-ver-2-7-2-latest-version-17dec387</link>
            <guid isPermaLink="false">d31e5ce7-d3da-4924-8071-65cd06cc082f</guid>
            <pubDate>Sat, 04 Apr 2026 15:40:56 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3355766 by resurrect20]]></description>
        </item>
        <item>
            <title><![CDATA[SSRF Filter Bypass via Unblocked NAT64 Local-Use IPv6 Prefix (64:ff9b:1::/48)]]></title>
            <link>https://academy.logicalbreach.com//writeups/ssrf-filter-bypass-via-unblocked-nat64-local-use-ipv6-prefix-64-ff9b-1-48-4906744a</link>
            <guid isPermaLink="false">ee7df73b-0bbd-4024-a4e0-b10af269acdb</guid>
            <pubDate>Sat, 04 Apr 2026 15:39:59 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3634400 by tipsen]]></description>
        </item>
        <item>
            <title><![CDATA[Path Traversal in writeFile via Unsafe Prefix Containment Check Allows Out-of-Directory Writes]]></title>
            <link>https://academy.logicalbreach.com//writeups/path-traversal-in-writefile-via-unsafe-prefix-containment-check-allows-out-of-directory-writes-4621e948</link>
            <guid isPermaLink="false">60935ac3-91de-4fb8-b5c3-63b05a455267</guid>
            <pubDate>Sat, 04 Apr 2026 15:25:03 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3634571 by tipsen]]></description>
        </item>
        <item>
            <title><![CDATA[Open Redirect — Base64-Encoded Parameter Bypasses Client-Side Validation on Login Page]]></title>
            <link>https://academy.logicalbreach.com//writeups/open-redirect-base64-encoded-parameter-bypasses-client-side-validation-on-login-page-d33fb2e0</link>
            <guid isPermaLink="false">053dba54-9289-4d7a-926d-7bcb10a8e42d</guid>
            <pubDate>Wed, 01 Apr 2026 09:22:56 GMT</pubDate>
            <description><![CDATA[A base64-encoded query parameter on a login/terms acceptance page was decoded and used directly in window.location.href with only protocol validation — no domain check. The writeup covers tracing the vulnerable code in the Angular bundle, crafting the payload, and why the legitimate branding makes this particularly effective for phishing.]]></description>
        </item>
        <item>
            <title><![CDATA[Information Disclosure — Unauthenticated API Exposes PII of 500+ Employees and Enterprise Clients]]></title>
            <link>https://academy.logicalbreach.com//writeups/information-disclosure-unauthenticated-api-exposes-pii-of-500-employees-and-enterprise-clients-852b28b3</link>
            <guid isPermaLink="false">79211a1d-3ac6-4da0-bc2d-705a9d94a0ed</guid>
            <pubDate>Wed, 01 Apr 2026 09:20:38 GMT</pubDate>
            <description><![CDATA[A hardcoded backend URL found in a JavaScript bundle exposed an unauthenticated API endpoint that returned 500+ records containing employee full names, enterprise client details, and internal database IDs. The writeup walks through discovering the URL in the JS bundle, querying the API, and the GDPR/business intelligence impact.]]></description>
        </item>
        <item>
            <title><![CDATA[HTML Injection via Email Address Payloads]]></title>
            <link>https://academy.logicalbreach.com//writeups/html-injection-via-email-address-payloads-3b0e2d6e</link>
            <guid isPermaLink="false">fb73a723-3dea-4719-b0f8-0dd5d3781c11</guid>
            <pubDate>Tue, 24 Mar 2026 18:27:43 GMT</pubDate>
            <description><![CDATA[How a simple payload and a shift in mindset exposed a vulnerability hidden in a complex invite and notification system.]]></description>
        </item>
        <item>
            <title><![CDATA[Fail-Open in set_tlsext_servername_callback on pyopenssl via unhandled exceptions leads to security bypass]]></title>
            <link>https://academy.logicalbreach.com//writeups/fail-open-in-set-tlsext-servername-callback-on-pyopenssl-via-unhandled-exceptions-leads-to-security-bypass-dd575890</link>
            <guid isPermaLink="false">e12938d1-0ba3-45a8-8eff-3a53fb4ca70b</guid>
            <pubDate>Sat, 21 Mar 2026 10:24:09 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3558277 by uv3doble]]></description>
        </item>
        <item>
            <title><![CDATA[[Privilege Escalation] User can Pin|Unpin Any Comment on Any Project or Locale]]></title>
            <link>https://academy.logicalbreach.com//writeups/privilege-escalation-user-can-pin-unpin-any-comment-on-any-project-or-locale-b91145b8</link>
            <guid isPermaLink="false">92c68f4b-e25b-47f7-b6de-1541ac07b3d3</guid>
            <pubDate>Sat, 21 Mar 2026 10:23:13 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3025797 by adilnbabras]]></description>
        </item>
        <item>
            <title><![CDATA[Business Logic Flaw Allowing Free Plan Users to Assign Restricted Roles]]></title>
            <link>https://academy.logicalbreach.com//writeups/business-logic-flaw-allowing-free-plan-users-to-assign-restricted-roles-5813b01a</link>
            <guid isPermaLink="false">2d623f8c-7ddb-4ad3-8258-1c81fb660e66</guid>
            <pubDate>Wed, 18 Mar 2026 23:30:49 GMT</pubDate>
            <description><![CDATA[The bug was a Business Logic vulnerability that allowed users to access paid features while they were on a free plan.]]></description>
        </item>
        <item>
            <title><![CDATA[Lack of Validation in Reward Redemption Allows Unlimited Burp Suite License Abuse]]></title>
            <link>https://academy.logicalbreach.com//writeups/lack-of-validation-in-reward-redemption-allows-unlimited-burp-suite-license-abuse-7431a4c3</link>
            <guid isPermaLink="false">8f5d6269-22a7-421b-9d32-d61c63ce2f9c</guid>
            <pubDate>Wed, 18 Mar 2026 15:09:26 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3378540 by theokeen]]></description>
        </item>
        <item>
            <title><![CDATA[How to bypass Cloudflare restrictions using Burp Suite]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/how-to-bypass-cloudflare-restrictions-using-burp-suite-944d259f</link>
            <guid isPermaLink="false">3b8e9d1a-3d05-4c24-a008-35d0df3a5219</guid>
            <pubDate>Tue, 17 Mar 2026 19:41:58 GMT</pubDate>
            <description><![CDATA[Bypassing Cloudflare WAF during security assessments involves handling headers, TLS fingerprinting, IP reputation, and JS challenges; however, the most effective approach is IP whitelisting, with tools like mitmproxy and custom TLS setups covering most remaining cases.]]></description>
        </item>
        <item>
            <title><![CDATA[2FA Bypass Despite Fix via Manual Injection of isVerifyAuth Cookie in Local Storage]]></title>
            <link>https://academy.logicalbreach.com//writeups/2fa-bypass-despite-fix-via-manual-injection-of-isverifyauth-cookie-in-local-storage-cad7154e</link>
            <guid isPermaLink="false">4153f1cc-f004-41c6-9e9e-ff1dc670f251</guid>
            <pubDate>Tue, 17 Mar 2026 18:42:12 GMT</pubDate>
            <description><![CDATA[After an initial 2FA bypass vulnerability was “fixed” by removing the isVerifyAuth cookie from local storage, the application still trusted this value if it existed.]]></description>
        </item>
        <item>
            <title><![CDATA[Automated Pentesting with Claude AI]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/automated-pentesting-with-claude-ai-799cd439</link>
            <guid isPermaLink="false">8f102632-ec9e-446b-ac16-3ddfe2bebca1</guid>
            <pubDate>Tue, 17 Mar 2026 18:20:07 GMT</pubDate>
            <description><![CDATA[Claude is effective at automated discovery and structured testing, but has notable blind spots; its ability to recognize what it missed adds value.]]></description>
        </item>
        <item>
            <title><![CDATA[IDOR leads Unauthorized Staff Member Removal via Insufficient Authorization Checks]]></title>
            <link>https://academy.logicalbreach.com//writeups/idor-leads-unauthorized-staff-member-removal-via-insufficient-authorization-checks-20ae7643</link>
            <guid isPermaLink="false">97b06e15-e674-4c37-9754-57eb903a680d</guid>
            <pubDate>Tue, 17 Mar 2026 18:16:10 GMT</pubDate>
            <description><![CDATA[Missing authorization checks allow unauthorized users to remove staff members from accounts they do not own, leading to potential disruption and abuse.]]></description>
        </item>
        <item>
            <title><![CDATA[XSS Bypass to Zero Click Account Takeover in AI Chatbot]]></title>
            <link>https://academy.logicalbreach.com//writeups/xss-bypass-to-zero-click-account-takeover-in-ai-chatbot-265f0dff</link>
            <guid isPermaLink="false">f7a38824-a2cd-4061-953d-38defed4cc35</guid>
            <pubDate>Tue, 17 Mar 2026 18:12:34 GMT</pubDate>
            <description><![CDATA[Poor HTML sanitization combined with a file upload feature led to a stored XSS that allowed administrator accounts to be compromised.]]></description>
        </item>
        <item>
            <title><![CDATA[Session Cookie Leakage via Static Header Field in WebViewerFragment]]></title>
            <link>https://academy.logicalbreach.com//writeups/session-cookie-leakage-via-static-header-field-in-webviewerfragment-94da2177</link>
            <guid isPermaLink="false">5cda71e7-2740-427a-8470-b1806583ea8f</guid>
            <pubDate>Tue, 17 Mar 2026 17:20:18 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3475626 by dphoeniixx]]></description>
        </item>
        <item>
            <title><![CDATA[Exposed .env File Leading to Full Email Account Takeover]]></title>
            <link>https://academy.logicalbreach.com//writeups/exposed-env-file-leading-to-full-email-account-takeover-196a7b57</link>
            <guid isPermaLink="false">35ede773-442a-46c9-a6cb-2b75cb3273b1</guid>
            <pubDate>Tue, 17 Mar 2026 11:29:57 GMT</pubDate>
            <description><![CDATA[An exposed .env file on the company’s website publicly revealed sensitive credentials, including SMTP, database, AWS, and Stripe keys. This allowed full access to the admin email account, potential misuse of customer orders, voucher codes, and financial data.]]></description>
        </item>
        <item>
            <title><![CDATA[2 IDOR’s & WAF Bypass to Expose Full Event Database]]></title>
            <link>https://academy.logicalbreach.com//writeups/2-idor-s-waf-bypass-to-expose-full-event-database-d5d344f5</link>
            <guid isPermaLink="false">2472ab10-9970-4caf-bb83-fb2402d70c88</guid>
            <pubDate>Tue, 17 Mar 2026 10:26:03 GMT</pubDate>
            <description><![CDATA[During a recent engagement on a food industry B2B platform, I discovered a vulnerability chain that allowed me to dump the entire database of users registered for a corporate event. By chaining a sequential ID enumeration vulnerability with a secondary IDOR on the “Edit Profile” endpoint - and optimizing the attack by identifying a weakness in the ID generation logic - I was able to access the Personally Identifiable Information (PII) of all event attendees.]]></description>
        </item>
        <item>
            <title><![CDATA[Business Logic Bypass Allows Setting “Read Access” Role Without Pro Plan Subscription]]></title>
            <link>https://academy.logicalbreach.com//writeups/business-logic-bypass-allows-setting-read-access-role-without-pro-plan-subscription-e2b2dd9f</link>
            <guid isPermaLink="false">ea1b038a-d458-4150-8b09-c0ba6fdf4b91</guid>
            <pubDate>Mon, 16 Mar 2026 16:21:46 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3591764 by ziadmomen]]></description>
        </item>
        <item>
            <title><![CDATA[Unauthenticated access to private files on app.fizzy.do via Active Storage URLs leads to information disclosure]]></title>
            <link>https://academy.logicalbreach.com//writeups/unauthenticated-access-to-private-files-on-app-fizzy-do-via-active-storage-urls-leads-to-information-disclosure-aef48763</link>
            <guid isPermaLink="false">0df14258-811c-4b20-8237-133dce13de0c</guid>
            <pubDate>Mon, 16 Mar 2026 16:21:13 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3467641 by perxibes]]></description>
        </item>
        <item>
            <title><![CDATA[IDOR Leading to Plaintext SFTP Credential Disclosure and Unauthorized SFTP Access]]></title>
            <link>https://academy.logicalbreach.com//writeups/idor-leading-to-plaintext-sftp-credential-disclosure-and-unauthorized-sftp-access-2aad24dc</link>
            <guid isPermaLink="false">30cb0f42-f3c0-4af2-814b-56be10e587ef</guid>
            <pubDate>Mon, 16 Mar 2026 11:19:56 GMT</pubDate>
            <description><![CDATA[An Insecure Direct Object Reference (IDOR) vulnerability in the organization API allows authenticated users to manipulate the identifier parameter and retrieve plaintext SFTP credentials belonging to other users or organizations, potentially leading to unauthorized access to sensitive files stored on the SFTP server.]]></description>
        </item>
        <item>
            <title><![CDATA[Scaling IDOR: Automated PII Exfiltration via Notification Configuration Endpoints]]></title>
            <link>https://academy.logicalbreach.com//writeups/scaling-idor-automated-pii-exfiltration-via-notification-configuration-endpoints-feeb1b23</link>
            <guid isPermaLink="false">68b91674-7f65-47ad-ad7c-c6fe16331cbd</guid>
            <pubDate>Mon, 16 Mar 2026 11:12:35 GMT</pubDate>
            <description><![CDATA[An IDOR vulnerability in a notification configuration endpoint allows an authenticated attacker to modify org_id and username_id to access sensitive user data from other organizations (email, phone, role, etc.).]]></description>
        </item>
        <item>
            <title><![CDATA[HTML Injection to DoS (P2)]]></title>
            <link>https://academy.logicalbreach.com//writeups/html-injection-to-dos-p2-40869d85</link>
            <guid isPermaLink="false">d3ea46d4-747d-48a4-ba27-ad52014f727d</guid>
            <pubDate>Sat, 14 Mar 2026 21:10:41 GMT</pubDate>
            <description><![CDATA[HTML Injection is a web security vulnerability that occurs when an application fails to properly sanitize or validate user-supplied input before rendering it in a web page. As a result, an attacker can insert arbitrary HTML code into the page, which is then displayed and executed in the browsers of other users. This can allow the attacker to manipulate the structure or content of the page, inject misleading elements, or create malicious links, potentially compromising user trust and the integrity of the website.]]></description>
        </item>
        <item>
            <title><![CDATA[SSL/TLS certificates Cheatsheet]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/ssl-tls-certificates-cheatsheet-bac86ed4</link>
            <guid isPermaLink="false">6e5471a9-1841-43e4-9ce9-446c7838424a</guid>
            <pubDate>Sat, 14 Mar 2026 15:30:21 GMT</pubDate>
            <description><![CDATA[Learn how to use sslscan to identify weak encryption configurations, deprecated SSL/TLS protocols, and potential security issues during web security assessments.]]></description>
        </item>
        <item>
            <title><![CDATA[XSS (Cross-Site Scripting) Cheatsheet]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/xss-cross-site-scripting-cheatsheet-cf941bea</link>
            <guid isPermaLink="false">7daa0677-2dca-46c9-b8e4-220571690272</guid>
            <pubDate>Sat, 14 Mar 2026 14:09:11 GMT</pubDate>
            <description><![CDATA[Master Cross-Site Scripting (XSS), including injection techniques, common attack vectors, WAF evasion methods, and advanced Content Security Policy (CSP) bypass techniques.]]></description>
        </item>
        <item>
            <title><![CDATA[SQLi (SQL Injection) Cheatsheet]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/sql-injection-sqli-cheatsheet-a523f80d</link>
            <guid isPermaLink="false">3846ea0b-a0f7-4df8-a371-f7785465bfb4</guid>
            <pubDate>Sat, 14 Mar 2026 14:05:28 GMT</pubDate>
            <description><![CDATA[Learn the fundamentals of SQL injection, including common exploitation techniques, WAF evasion methods, and essential payloads used during security testing and bug bounty hunting.]]></description>
        </item>
        <item>
            <title><![CDATA[XXE (XML External Entity) Cheatsheet]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/xxe-xml-external-entity-cheatsheet-297f7214</link>
            <guid isPermaLink="false">6d793fee-b496-49d3-8841-3dc1688dc99b</guid>
            <pubDate>Sat, 14 Mar 2026 14:01:00 GMT</pubDate>
            <description><![CDATA[This cheatsheet provides a quick reference for exploiting and testing XML External Entity (XXE) vulnerabilities. It includes common payloads, techniques for file disclosure, SSRF, blind XXE exploitation, out-of-band exfiltration, and typical XML structures used during testing. It is intended as a practical guide to quickly identify and exploit XXE in different scenarios and parser configurations.]]></description>
        </item>
        <item>
            <title><![CDATA[Bug Bounty Cheatsheet]]></title>
            <link>https://academy.logicalbreach.com//cheatsheets/bug-bounty-cheatsheet-ed129872</link>
            <guid isPermaLink="false">e71bf6b7-9f82-4cce-b11e-58f2ae11b91e</guid>
            <pubDate>Sat, 14 Mar 2026 13:52:25 GMT</pubDate>
            <description><![CDATA[A collection of bug bounty and security testing resources covering common web vulnerabilities, exploitation techniques, reconnaissance methods, and security tools. It includes guides, real-world write-ups, checklists, and tools for testing issues like XSS, SQL injection, SSRF, file uploads, authentication bypasses, cloud misconfigurations, and subdomain enumeration.]]></description>
        </item>
        <item>
            <title><![CDATA[Authorization Bypass in Starknet Snap via enableAuthorize parameter leads to unauthorized transaction signing]]></title>
            <link>https://academy.logicalbreach.com//writeups/authorization-bypass-in-starknet-snap-via-enableauthorize-parameter-leads-to-unauthorized-transaction-signing-fcc5b9f1</link>
            <guid isPermaLink="false">7fc0ccb5-857e-4c4a-9603-b906494d1289</guid>
            <pubDate>Fri, 13 Mar 2026 10:45:54 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3507241 by aszx87410]]></description>
        </item>
        <item>
            <title><![CDATA[Bypass of Open Redirect Fix on lovable.dev via /..// Path Traversal in redirect parameter]]></title>
            <link>https://academy.logicalbreach.com//writeups/bypass-of-open-redirect-fix-on-lovable-dev-via-path-traversal-in-redirect-parameter-9bc11b88</link>
            <guid isPermaLink="false">a1449022-1787-48a5-a097-61c1bdc8e1aa</guid>
            <pubDate>Thu, 12 Mar 2026 11:20:00 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3599248 by marioniangi]]></description>
        </item>
        <item>
            <title><![CDATA[CVE-2026-3805: use after free in SMB connection reuse]]></title>
            <link>https://academy.logicalbreach.com//writeups/cve-2026-3805-use-after-free-in-smb-connection-reuse-efca8b44</link>
            <guid isPermaLink="false">3ca56f74-a3e0-4736-b6d2-d6aee568fc3a</guid>
            <pubDate>Wed, 11 Mar 2026 10:34:57 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3591944 by rat5ak]]></description>
        </item>
        <item>
            <title><![CDATA[CVE-2026-3784: wrong proxy connection reuse with credentials]]></title>
            <link>https://academy.logicalbreach.com//writeups/cve-2026-3784-wrong-proxy-connection-reuse-with-credentials-8ab2057e</link>
            <guid isPermaLink="false">917fb84f-b4f0-415d-a142-704eabd9b093</guid>
            <pubDate>Wed, 11 Mar 2026 10:33:58 GMT</pubDate>
            <description><![CDATA[HackerOne disclosed report --> https://hackerone.com/reports/3584903 by nobcoder]]></description>
        </item>
    </channel>
</rss>