writeups.xyz
/
Red Bull
Title
Vulnerabilities
Programs
Authors
How I found multiple critical bugs in Red Bull
Authentication Bypass
HTTP Response Manipulation
Path Traversal
LFI
XSS
SQL Injection
RCE
Unrestricted File Upload
RFI
Security Code Review
Red Bull
Bartłomiej Bergier (@_Bergee_)
Page 1 of 1