The librarian rushed some final changes to the web application before heading off on holiday. In the process, they accidentally left sensitive information behind! Your challenge is to find and exploit the vulnerabilities in the application to extract these secrets. The post Write-up: Extract appeared first on Wild Wild Wolf.| Wild Wild Wolf
*Critical vulnerabilities in Pudu Robotics' entire fleet - BellaBot, KettyBot, and all their service robots used globally. They ignored emails until I contacted their biggest customers.* ## More Than Just Robot Waiters  You've probably seen these cat-faced robots delivering food in restaurants. Pudu Robotics is the world's largest commercial service robotics company, making not just the famous BellaBot robot waiter, but an entire [...| bobdahacker blog
*Flutrr, backed by The Times of India, has critical security flaws that expose all user data. They knew about it since November 2024 and still haven't fixed it.* ## What I Found Every single API endpoint has the same problem: they just trust what the client tells them, No authentication checks. Nothing. Here's what I could do: **1. Login to Anyones account:** The Google login API just takes the users email you wanna login to: ![Flutrr Login Request](/static/images/blogs/flutrr/login_request.p...| bobdahacker blog
Wix's newly acquired 'vibe coding' platform, Base44, had a critical authentication vulnerability allowing unauthorized access, reports Wiz Research.| WinBuzzer
A severe authentication bypass security flaw riddled the GoAnywhere MFT that could allow creating rogue admin accounts. While the developers patched the vulnerability already, researchers could still develop a working exploit for it, urging users| Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Test...
A recent zero-day vulnerability has been publicly shared revealing a critical issue with the nginx-ldap-auth software package allowing attackers to potentially bypass authentication and disclose ke…| GrimBlog