bug-bounty622
facebook466
xss316
google157
rce105
microsoft103
apple68
csrf61
account-takeover54
web354
writeup51
exploit43
sqli41
cve37
ssrf35
cloudflare33
dos33
malware30
privilege-escalation29
defi28
smart-contract-vulnerability25
idor24
subdomain-takeover24
smart-contract23
clickjacking23
ethereum23
node22
access-control21
vulnerability-disclosure21
browser20
auth-bypass20
lfi19
aws19
remote-code-execution18
docker17
reverse-engineering17
react17
cloud17
oauth16
cors16
race-condition16
info-disclosure15
solidity14
authentication-bypass14
phishing13
supply-chain13
wordpress12
denial-of-service11
delegatecall11
sql-injection11
0
A writeup on bypassing a Web Application Firewall (WAF) to exploit a blind SQL injection vulnerability discovered during security research. The article documents the techniques used to evade WAF detection while exploiting the underlying database vulnerability.
Robin Verton
Deutsche Telekom AG