KKeensafeCompliance

Findings

IDTitleServiceSeverityStatusFirst seen
f-001SQL injection in /login (online.keensafeglobalbank.com) internet-banking critical open2026-04-22
f-002BOLA / IDOR in /api/v1/accounts/{id} public-api high open2026-04-23
f-003SSRF in /api/v1/fetch public-api high open2026-04-24
f-004Stealer-log credential reused on /admin/login admin-panel critical open2026-04-22
f-005Weak JWT — alg=none accepted internet-banking high open2026-04-25
f-006Path traversal in /files/download and /api/v1/export internet-banking + public-api high open2026-04-25
f-007Stored XSS in admin notes and support comments admin-panel + support-portal medium open2026-04-23
f-008Mass assignment — PUT /api/v1/users/{id} accepts role public-api high open2026-04-24
f-009Wide-open CORS on api.keensafeglobalbank.com public-api medium open2026-04-23
f-010Sensitive backup zip exposed at /backup/ corporate-web high open2026-04-21
f-011Prompt injection / system-prompt leakage on chatbot llm-chatbot high open2026-04-26
f-012Hard-coded admin / admin123 + MFA accepts 0000 admin-panel critical open2026-04-21
f-013Audit log tampering — DELETE /audit-logs/{id} admin-panel high open2026-04-22
f-014GDPR / KVKK over-disclosure — customer records via /customer-lookup support-portal high open2026-04-23
f-015Leaked AWS keys in build logs (Jenkins) and SDK samples jenkins + developer-portal high open2026-04-24