HackerOne Bug Bounty Disclosure: std-process-command-batch-files-argument-escaping-could-be-bypassed-with-trailing-whitespace-or-periods–xpl-r-r

Company Name:
Internet Bug Bounty

Company HackerOne URL:
https://hackerone.com/ibb

Submitted By:
4xpl0r3r

Link to Submitters Profile:
https://hackerone.com/4xpl0r3r

Report Title:
`std::process::Command` batch files argument escaping could be bypassed with trailing whitespace or periods

Report Link:
https://hackerone.com/reports/2721478

Date Submitted:
22 November 2024

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.