
djurado
@djurado9
Security Researcher at @xbow - Former @microsoft Activision Blizzard King - Bug Bounty Hunter hackerone.com/djurado
ID: 66974627
https://hackerone.com/djurado 19-08-2009 11:24:15
4,4K Tweet
5,5K Takipçi
660 Takip Edilen

Julien | MrTuxracer 🇪🇺 XBOW Some examples from recent findings, but there are many more: •Code execution via WebSocket endpoints •SpEL injection & sandbox escapes •SSTI-based payload execution •SOAP abuse to RCE •Auth bypass → code execution •JS-based injection •Hidden upload endpoints + extension