<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:media="http://search.yahoo.com/mrss/" 
	>
<channel>
	<title>
	Comments for Hackersatty – Learn Ethical Hacking, Bug Bounty, and Cybersecurity Tips	</title>
	<atom:link href="https://hackersatty.com/comments/feed/" rel="self" type="application/rss+xml" />
	<link>https://hackersatty.com</link>
	<description>Hack Ethicaly, Hunt Bugs</description>
	<lastBuildDate>Sun, 15 Jun 2025 06:01:40 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		Comment on Javascript analysis for Bug Bounty: 3 Step Guide to Find Critical Web Vulnerabilities by Privilege Escalation: Privilege Escalation In GraphQL – 1 Shocking Real-World Bug Bounty Exploit &#124;		</title>
		<link>https://hackersatty.com/javascript-analysis-bug-bounty/#comment-6</link>

		<dc:creator><![CDATA[Privilege Escalation: Privilege Escalation In GraphQL – 1 Shocking Real-World Bug Bounty Exploit &#124;]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 09:26:28 +0000</pubDate>
		<guid isPermaLink="false">https://hackersatty.com/?p=22#comment-6</guid>

					<description><![CDATA[[&#8230;] Javascript analysis for Bug Bounty: 3 Step Guide to Find Critical Web Vulnerabilities [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Javascript analysis for Bug Bounty: 3 Step Guide to Find Critical Web Vulnerabilities [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Privilege Escalation in GraphQL – 1 Shocking Real-World Bug Bounty Exploit by Unauthorized Access To Admin Pages: 5 Bug Bounty Tips To Detect Unauthorized Access To Admin Pages &#124;		</title>
		<link>https://hackersatty.com/privilege-escalation-graphql/#comment-5</link>

		<dc:creator><![CDATA[Unauthorized Access To Admin Pages: 5 Bug Bounty Tips To Detect Unauthorized Access To Admin Pages &#124;]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 08:25:01 +0000</pubDate>
		<guid isPermaLink="false">https://hackersatty.com/?p=228#comment-5</guid>

					<description><![CDATA[[&#8230;] Privilege Escalation in GraphQL: Exploiting Finance Role Token to Access Admin Data &#8211; Part 1 [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Privilege Escalation in GraphQL: Exploiting Finance Role Token to Access Admin Data &#8211; Part 1 [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on API Security: 1 Critical Bug Bounty Case Study on Swagger UI Vulnerability by Unauthorized Access To Admin Pages: 5 Bug Bounty Tips To Detect Unauthorized Access To Admin Pages &#124;		</title>
		<link>https://hackersatty.com/api-security-swagger-ui-bug/#comment-4</link>

		<dc:creator><![CDATA[Unauthorized Access To Admin Pages: 5 Bug Bounty Tips To Detect Unauthorized Access To Admin Pages &#124;]]></dc:creator>
		<pubDate>Fri, 06 Jun 2025 08:24:08 +0000</pubDate>
		<guid isPermaLink="false">https://hackersatty.com/?p=47#comment-4</guid>

					<description><![CDATA[[&#8230;] API Security: 1 Critical Bug Bounty Case Study on Swagger UI Vulnerability [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] API Security: 1 Critical Bug Bounty Case Study on Swagger UI Vulnerability [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted 1 Endpoint Allows Irreversible Data Deletion by API Security: API Security: 1 Critical Bug Bounty Case Study On Swagger UI Vulnerability &#124;		</title>
		<link>https://hackersatty.com/unauthenticated-api-endpoint-2/#comment-3</link>

		<dc:creator><![CDATA[API Security: API Security: 1 Critical Bug Bounty Case Study On Swagger UI Vulnerability &#124;]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 18:17:45 +0000</pubDate>
		<guid isPermaLink="false">https://hackersatty.com/?p=273#comment-3</guid>

					<description><![CDATA[[&#8230;] Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted Endpoint Allows Irreve&#8230; [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted Endpoint Allows Irreve&#8230; [&#8230;]</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		Comment on Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted 1 Endpoint Allows Irreversible Data Deletion by How I Discovered A Critical Web Vulnerability Via JavaScript Analysis: A Bug Bounty Case Study &#124;		</title>
		<link>https://hackersatty.com/unauthenticated-api-endpoint-2/#comment-2</link>

		<dc:creator><![CDATA[How I Discovered A Critical Web Vulnerability Via JavaScript Analysis: A Bug Bounty Case Study &#124;]]></dc:creator>
		<pubDate>Tue, 03 Jun 2025 19:22:21 +0000</pubDate>
		<guid isPermaLink="false">https://hackersatty.com/?p=273#comment-2</guid>

					<description><![CDATA[[&#8230;] Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted Endpoint Allows Irreve&#8230; [&#8230;]]]></description>
			<content:encoded><![CDATA[<p>[&#8230;] Critical Security Vulnerability: Unauthenticated Access to /shipments/deleted Endpoint Allows Irreve&#8230; [&#8230;]</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
