Back to directory
WRITEUP #2874

For the first Bounty, it takes a few challenging months, but only a few days for the second.

OtherOld components with known vulnerabilities
by@interc3pt3r(Aneesha D)
Bounty
250
Program
-
Published
Mar 18, 2022
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://medium.com/@interc3pt3r/for-the-first-bounty-it-takes-a-few-challenging-months-but-only-a-few-days-for-the-second-7b53259b0199
RELATED WRITEUPS
Data Theft in Salesforce: Manipulating Public Links
OtherSOQL injection
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Other2FA / MFA bypass
SSTI in Bug Bounty Program: The Time I Played with Handlebars and Broke Stuff
OtherSSTI
Ghost In The Ppl Part 1: Byovdll
OtherUse-After-Free
Part 2: From Byovdll To Arbitrary Code Execution In Lsass
OtherUse-After-Free

Built with ❤️ by Shubham Rawat