bug-bounty473
google371
microsoft318
facebook271
xss267
rce184
apple178
malware177
exploit165
cve122
account-takeover110
bragging-post102
phishing85
csrf85
privilege-escalation83
browser71
supply-chain69
stored-xss65
authentication-bypass64
dos64
react58
reflected-xss57
cloudflare52
reverse-engineering50
access-control48
node48
input-validation48
aws48
cross-site-scripting48
writeup47
docker46
ssrf45
smart-contract45
ethereum44
web-security43
sql-injection43
defi43
web343
oauth41
web-application41
lfi38
info-disclosure37
pentest37
race-condition37
idor35
burp-suite35
auth-bypass35
vulnerability-disclosure34
cloud34
html-injection33
0
8/10
vulnerability
GitHub Desktop on macOS allowed remote code execution via a crafted x-github-client:// URI with a malicious filepath parameter that bypassed repository directory restrictions and enabled execution of arbitrary application bundles. The vulnerability exploited Electron's shell.openExternal() function converting file paths to file:// URLs, allowing attackers to execute malicious OSX apps cloned from attacker-controlled repositories.
rce
remote-code-execution
uri-scheme-handling
path-traversal
electron
macos
osx
github-desktop
arbitrary-file-open
social-engineering
application-bundle-execution
GitHub Desktop
0xacb
HackerOne
H1-702
GitHub
Electron
CVE (unreferenced but likely assigned)
zhuowei