Submitter : c2a
Date: 26 December 2022
Bounty : undisclosed
Vulnerabilities :
- Authentication Bypass
- HTTP Response Manipulation
- Path Traversal
- LFI
- XSS
- SQL Injection
- RCE
- Unrestricted File Upload
- RFI
- Security Code Review
Programs :
Authors :
Link : https://bergee.it/blog/how-i-found-multiple-critical-bugs-in-red-bull/