Xiety
@_xiety
Securing the internet one bug at a time :) | Top 15 @YesWeHack
ID: 1437537485207257093
13-09-2021 22:03:51
493 Tweet
432 Followers
277 Following
The moment I see something like {"email":"[email protected]"}, I instantly try these 3 payloads: - {"email":["[email protected]", "[email protected]"]} - {"email":"[email protected]", "email":"[email protected]"} - [email protected] Simple trick. Big impact.
Anyone else having slow withdrawal times on YesWeHack ⠵ ?
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ -- Improper Authentication - Generic (CWE-287). yeswehack.com/hunters/xiety #YesWeRHackers
Just got a reward for a vulnerability submitted on YesWeHack ⠵ -- Use of Unmaintained Third Party Components (CWE-1104). yeswehack.com/hunters/xiety #YesWeRHackers
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ -- Cleartext Storage of Sensitive Information (CWE-312). yeswehack.com/hunters/xiety #YesWeRHackers