I exploited a stored image injection vuln recently where I could repeatedly log a user into a different account and then they could never get access to their own account!
Here's how I did it.
I exploited a stored image injection vuln recently where I could repeatedly log a user into a different account and then they could never get access to their own account!
Here's how I did it.