Vulnerability Challenge Dashboard
Privilege Escalation to an Admin Account
Local File Read via LaTex Injection
Price Manipulation via Integer Overflow
Chaining Multiple Low-Severity Bugs
Bypassing URL filters via URI Normalization
Making an Unblockable Email Address