HackerOne Bug Bounty Disclosure: std-process-command-batch-files-argument-escaping-could-be-bypassed-with-trailing-whitespace-or-periods–xpl-r-r
Company Name:
Internet Bug Bounty
Company HackerOne URL:
https://hackerone.com/ibb
Submitted By:
4xpl0r3r
Link to Submitters Profile:
https://hackerone.com/4xpl0r3r
Report Title:
`std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periods
Report Link:
https://hackerone.com/reports/2721478
Date Submitted:
22 November 2024
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.