Back to directory
WRITEUP #3321

Exploitation of file’s download parameters to create potential risk of malware delivery: $200 bug!

CSRFRCE
by@Muhammad__Aamir(Muhammad Aamir)
Bounty
200
Program
-
Published
Oct 17, 2021
Added to HackDex
Sep 15, 2022
Read Full Writeuphttps://muhammad-aamir.medium.com/exploitation-of-files-download-parameters-to-create-potential-risk-of-malware-delivery-200-bug-e2bcce0e737
RELATED WRITEUPS
Vulnerabilities in Homepage Dashboard
RCESSRF
SSD Advisory – XenForo RCE Via CSRF
RCECSRF
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization

Built with ❤️ by Shubham Rawat