bug-bounty489
google320
xss283
microsoft260
facebook227
rce176
apple154
exploit147
malware112
account-takeover109
bragging-post102
cve92
csrf85
privilege-escalation81
authentication-bypass66
stored-xss65
writeup63
phishing60
reflected-xss57
browser57
dos57
react54
ssrf52
access-control51
supply-chain49
input-validation49
cross-site-scripting48
cloudflare48
aws47
node46
docker46
smart-contract45
sql-injection45
ethereum44
web-application43
web-security43
defi43
oauth42
reverse-engineering42
web340
lfi37
burp-suite36
idor36
vulnerability-disclosure35
html-injection33
race-condition33
smart-contract-vulnerability32
csp-bypass32
clickjacking31
information-disclosure30
0
7/10
A race condition vulnerability in a web application's file upload feature allowed RCE by exploiting a 2-second window where uploaded files were stored locally before being moved to S3. The modify.php endpoint lacked extension filtering present in upload.php, enabling PHP shell upload followed by rapid re-requests to execute the file during the local storage window before S3 migration.
race-condition
rce
file-upload
bypass
extension-filter
php
s3
modify-php
upload-php
local-file-inclusion
timing-attack
reverse-shell
bug-chaining
YoKo Kho
Faisal Yudo Hernawan
Tomi
Amazon S3
upload.php
modify.php