bug-bounty448
google355
microsoft313
facebook262
xss238
apple180
malware174
rce149
exploit124
bragging-post101
cve99
account-takeover93
phishing83
csrf79
privilege-escalation77
stored-xss65
supply-chain65
authentication-bypass63
dos60
reflected-xss57
browser57
react50
cloudflare49
reverse-engineering48
input-validation48
cross-site-scripting48
access-control47
smart-contract45
docker45
aws45
node44
ethereum43
web343
sql-injection43
web-security42
defi42
web-application41
ssrf38
burp-suite35
vulnerability-disclosure34
idor34
race-condition33
html-injection33
info-disclosure33
smart-contract-vulnerability32
writeup32
buffer-overflow32
cloud32
oauth32
information-disclosure30
0
6/10
A researcher discovered an SSRF vulnerability in Adfly's URL shortening service that allowed sending arbitrary emails via the SMTP protocol using Gopher protocol manipulation. By uploading a PHP file with a Gopher payload to a third-party server and shortening it through Adfly, the attacker could trigger email spoofing from the Adfly SMTP server.
ssrf
gopher-protocol
smtp-exploitation
server-side-request-forgery
email-spoofing
gopherus
php
url-shortener
bug-bounty-writeup
fastcgi
Adfly
Rafli Pasya
Zerb0a
Gopherus
SMTP
0
6/10
bug-bounty
Researcher discovered a wildcard subdomain takeover vulnerability on uber.design by identifying that the domain's wildcard DNS pointed to Heroku's unclaimed infrastructure, allowing registration of arbitrary subdomains (*.uber.design) and potential email spoofing via Google Workspace verification.
subdomain-takeover
wildcard-dns
heroku
recon
domain-enumeration
google-workspace-verification
email-spoofing
uber
bug-bounty
Uber
HackerOne
Heroku
Google G-Suite
Muhammad Khizer Javed
uranium238