Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- LaNuitDebout XPATH injection vulnerability
- I said it all...
- Since they have no contact informations...
- https://chat.nuitdebout.fr/home?name=&emailOrUsername=&email=&pass=&confirm-pass=
- Modifying form field using a simple payload such as 'or '1'='1 has direct effect on data validation, sending and could lead to unauthorized access.
- No bragging, no datas, no harm. I just had no other way to tell the devs...
- https://www.reddit.com/r/hacking/comments/4gk9zh/lanuitdebout_xpath_injection_vulnerability/
Add Comment
Please, Sign In to add comment