bug-bounty462
xss234
bragging-post117
microsoft90
rce89
google88
account-takeover82
open-source79
csrf77
authentication-bypass76
facebook75
stored-xss74
web-security64
reflected-xss63
apple62
access-control61
privilege-escalation60
ai-agents59
input-validation51
malware49
defi48
sql-injection48
smart-contract47
cross-site-scripting47
ethereum44
api-security42
information-disclosure41
privacy39
web-application39
cve38
phishing37
tool37
ssrf37
burp-suite36
automation34
llm34
html-injection33
web333
smart-contract-vulnerability33
vulnerability-disclosure33
exploit32
responsible-disclosure32
waf-bypass31
opinion31
denial-of-service30
idor29
machine-learning29
code-generation28
authentication27
dos27
0
8/10
Ubiquiti UniFi v3.2.10 and below contains a generic CSRF protection bypass that strips the Referer header, allowing attackers to perform unauthorized actions like changing user passwords, adding new users, and creating WLAN configurations. The exploit uses enctype='text/plain', iframe source manipulation, and JavaScript to strip the Referer header and submit JSON-based CSRF attacks.
csrf
cross-site-request-forgery
ubiquiti
unifi
referer-header-bypass
json-based-csrf
authentication-bypass
web-vulnerability
exploit-technique
bug-bounty
Ubiquiti
UniFi v3.2.10
HackerOne
MITRE
Julien Ahrens
RCE Security
OSVDB