Lilian Fellice
@lilianfellice
Président - Bluehack top 25 YesWeHack
ID: 1384466957093666825
https://bluehack.fr 20-04-2021 11:20:27
87 Tweet
188 Followers
217 Following
Nice Job Lilian Fellice can't wait to read your book #Bugbounty amazon.fr/dp/B0CHGH2BT7?…
Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ -- Insecure Direct Object Reference (IDOR) (CWE-639). PII of a very sensitive scope, access to all users' information. yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ -- Improper Access Control - Generic (CWE-284). Bypass protection to access admin functions yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ -- Cross-site Scripting (XSS) - Stored (CWE-79). Lead to total admin access yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ -- Path Traversal (CWE-22). yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ -- Insecure Direct Object Reference (IDOR) (CWE-639). yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ 🫡 -- Improper Access Control - Generic (CWE-284). yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a high vulnerability submitted on YesWeHack ⠵ -- Insecure Direct Object Reference (IDOR) (CWE-639). yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ @icare I’m coming 🤩😁 -- OS Command Injection (CWE-78). yeswehack.com/hunters/blueha… #YesWeRHackers
Just got a reward for a critical vulnerability submitted on YesWeHack ⠵ -- Improper Access Control - Generic (CWE-284). yeswehack.com/hunters/blueha… #YesWeRHackers
We’ve just landed a $12,000 bounty with Lilian Fellice on a public program at bugcrowd with a nice admin panel access bypass (and few other things :D) ! The asset where this was discovered was, of course, found using Profundis.io 😇