Erick Fernando

70 posts

Erick Fernando

Erick Fernando

@erickfernandox

https://t.co/qju40dBXtK

Brazil Katılım Mayıs 2011
259 Takip Edilen1.5K Takipçiler
Erick Fernando
Erick Fernando@erickfernandox·
Critical Vulnerability Rewarded by Deutsche Telekom (T-Mobile Germany/European Union) #bugbounty #p1
Erick Fernando tweet media
English
6
7
252
14.1K
Erick Fernando
Erick Fernando@erickfernandox·
@cyberx00t Next, I generated a token using the OAuth code, and the generated token was an Amazon Cognito JWT. Using any regular user's Amazon Cognito token, I could access resources in any company system that user had access to.
English
0
0
0
73
Erick Fernando
Erick Fernando@erickfernandox·
A simple open redirect can wreak havoc. Simple open redirect -> misconfigured OAuth authentication flow -> privilege abuse using Amazon Cognito token #bugbounty #bugcrowd
Erick Fernando tweet media
English
5
17
348
14.2K
Erick Fernando
Erick Fernando@erickfernandox·
@cyberx00t The application had a centralized API login using OAuth, and one of the domains had an open redirect vulnerability. It was possible to inject into the redirect_uri that returns the OAuth code to the application, allowing me to capture it.
English
0
0
6
470
Erick Fernando
Erick Fernando@erickfernandox·
Host Header Injection🤝Cache Poisoning 🤝 Path Traversal = Stored XSS via Path Confusion❤️ #bugbounty #intigriti
Erick Fernando tweet media
English
4
9
171
7.2K
Erick Fernando retweetledi
Hackmanac
Hackmanac@H4ckmanac·
🚨Chrome Zero-day Alert: PATCH NOW‼️ Google released an emergency security update for Chrome to patch CVE-2025-6558, a high-severity zero-day vulnerability (CVSS 8.8) that is actively exploited in the wild. The flaw resides in Chrome’s ANGLE and GPU components, where insufficient validation of untrusted input can allow remote attackers to perform a sandbox escape through a crafted HTML page. This enables attackers to break out of the browser’s security environment and potentially gain access to the underlying system without user interaction. The vulnerability was discovered by Clément Lecigne and Vlad Stolyarov from Google’s Threat Analysis Group (TAG) on June 23, 2025. While the full details of the exploitation have not been disclosed, Google’s acknowledgment suggests possible nation-state involvement. Users are urged to update Chrome to version 138.0.7204.157 or later. more: thehackernews.com/2025/07/urgent…
Hackmanac tweet media
English
1
49
81
12.7K
c4ng4c3ir0
c4ng4c3ir0@c4ng4c3ir0·
tá pra criarem um suporte pior do que o da @Hacker0x01 Vc abre um chamado no report, na plataforma de suporte, passam meses e ninguém responde
Português
3
1
29
1.8K