writeups.xyz
/
Yellowfin BI
Title
Vulnerabilities
Programs
Authors
Exploiting Hardcoded Keys to achieve RCE in Yellowfin BI
RCE
Authentication Bypass
Security Code Review
JWT
Yellowfin BI
Maxwell Garrett (@TheGrandPew)
Shubham Shah (@Infosec_au)
Page 1 of 1