bug-bounty496
xss255
rce132
bragging-post119
google109
account-takeover107
authentication-bypass94
privilege-escalation92
open-source92
facebook86
csrf83
malware83
microsoft76
access-control75
stored-xss75
ai-agents67
web-security64
reflected-xss63
exploit62
phishing59
cve55
information-disclosure52
input-validation52
sql-injection51
smart-contract49
defi48
cross-site-scripting48
privacy47
tool46
ethereum46
reverse-engineering45
ssrf44
api-security44
vulnerability-disclosure40
web-application38
ai-security38
burp-suite37
opinion37
llm37
dos36
writeup36
apple36
automation35
responsible-disclosure35
cloudflare34
remote-code-execution33
web333
infrastructure33
html-injection33
smart-contract-vulnerability33
0
5/10
A researcher discovered an SSRF vulnerability in a crypto exchange platform's image loading endpoint that allowed reading local files via file:// protocol and extracting AWS EC2 metadata credentials from the 169.254.169.254 metadata service, ultimately achieving RCE and receiving a 4-digit bounty.
ssrf
aws-metadata
local-file-read
rce
aws-credentials-extraction
url-schema-abuse
file-protocol
ec2-metadata
bug-bounty
bragging-post
pratik yadav
AWS
EC2
Elastic Beanstalk
brutelogic.com.br
ENCIPHERS
Abhinav mishra
Narendra
abhishek
NotSoSecure