Code_13x ( Jelison Fernandes )

44 posts

Code_13x ( Jelison Fernandes ) banner
Code_13x ( Jelison Fernandes )

Code_13x ( Jelison Fernandes )

@code_13x

Security Researcher || Bug Hunter || H1 Clear Verified || CVE-2025-20258

Inscrit le Ocak 2022
479 Abonnements2.1K Abonnés
furkan
furkan@furkan0x01·
let's see what's this about
furkan tweet media
English
4
0
65
5.6K
Code_13x ( Jelison Fernandes )
@Cachorroexausto If logged in user get affected directly then they should accept the bug. But it depends on the type of application you are testing on. And showing the impact.
English
0
0
2
473
Fares
Fares@_2os5·
@code_13x Nice catch! But tbh I am not sure why it is Critical, because how will you get the victim email? Otherwise yes!
English
1
0
2
577
🦇 ©
🦇 ©@Blackstone0123·
@code_13x I reported the same vulnerability to a program on Bugcrowd. It was marked “N/A” by the triager, who said, “Dos out of scope.” Haha. Clear difference between bugcrowd vs Hackerone.
English
1
0
6
552
Code_13x ( Jelison Fernandes )
@Dedrknex Yes, most programs don’t accept it, but it depends on the impact. In my case, I couldn’t chain it, so it remained at medium severity
English
0
0
3
251
RoHiT
RoHiT@Dedrknex·
@code_13x Congratulations. Most of my html injections are low/informative
English
1
0
3
310
Code_13x ( Jelison Fernandes )
@bhaveshdewasii Tip: Try to increase the hunting time to 8 hours. Dont look for bugs try to understand the functionalities how it works. And stick with one program until you find something
English
1
0
12
473
.
.@bhaveshdewasii·
Day 26 – #150DayBugBountyChallenge - Hunted 4 hours today, found nothing. Total hours logged so far: 26. - Feeling like switching things up again, still experimenting with approach. - Learned about DOMLogger — seems like a really solid tool, excited to try it out more.
English
5
0
63
3.6K