Code_13x ( Jelison Fernandes )

44 posts

Code_13x ( Jelison Fernandes ) banner
Code_13x ( Jelison Fernandes )

Code_13x ( Jelison Fernandes )

@code_13x

Security Researcher || Bug Hunter || H1 Clear Verified || CVE-2025-20258

Katılım Ocak 2022
477 Takip Edilen2.1K Takipçiler
furkan
furkan@furkan0x01·
let's see what's this about
furkan tweet media
English
4
0
65
5.6K
Code_13x ( Jelison Fernandes )
@Cachorroexausto If logged in user get affected directly then they should accept the bug. But it depends on the type of application you are testing on. And showing the impact.
English
0
0
2
477
Fares
Fares@_2os5·
@code_13x Nice catch! But tbh I am not sure why it is Critical, because how will you get the victim email? Otherwise yes!
English
1
0
2
581
🦇 ©
🦇 ©@Blackstone0123·
@code_13x I reported the same vulnerability to a program on Bugcrowd. It was marked “N/A” by the triager, who said, “Dos out of scope.” Haha. Clear difference between bugcrowd vs Hackerone.
English
1
0
6
557
Code_13x ( Jelison Fernandes )
@Dedrknex Yes, most programs don’t accept it, but it depends on the impact. In my case, I couldn’t chain it, so it remained at medium severity
English
0
0
3
253
RoHiT
RoHiT@Dedrknex·
@code_13x Congratulations. Most of my html injections are low/informative
English
1
0
3
312
Code_13x ( Jelison Fernandes )
@bhaveshdewasii Tip: Try to increase the hunting time to 8 hours. Dont look for bugs try to understand the functionalities how it works. And stick with one program until you find something
English
1
0
12
476