bug-bounty496
xss255
rce132
bragging-post119
google109
account-takeover107
authentication-bypass94
privilege-escalation92
open-source92
facebook86
csrf83
malware83
microsoft76
access-control75
stored-xss75
ai-agents67
web-security64
reflected-xss63
exploit62
phishing59
cve55
information-disclosure52
input-validation52
sql-injection51
smart-contract49
defi48
cross-site-scripting48
privacy47
tool46
ethereum46
reverse-engineering45
ssrf44
api-security44
vulnerability-disclosure40
web-application38
ai-security38
burp-suite37
opinion37
llm37
dos36
writeup36
apple36
automation35
responsible-disclosure35
cloudflare34
remote-code-execution33
web333
infrastructure33
html-injection33
smart-contract-vulnerability33
0
5/10
bug-bounty
A security researcher describes discovering 3 vulnerabilities in Yahoo's bug bounty program: two remote code executions via command injection in a Brightroll queue management service (with filter bypass techniques), and an SSRF leading to arbitrary file read via curl flag injection in the Yahoo Small Business image processing endpoint.
rce
bug-bounty
command-injection
ssrf
json-injection
rabbitmq
curl-exploitation
filter-bypass
reconnaissance
brightroll
yahoo-smallbusiness
bragging-post
Kedrisec
Yahoo
Brightroll
RabbitMQ
Aquatone
Google
AWS