Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Not sure what the e-mail confirmation flow does but your upload leaks the fileId that can be used to construct the target URI without it.


There are documents in here with PII. Be very careful OP, you're exposing a lot.


Can you let me know where you were able to gain access? Just trying to learn - thanks


How is SQL Injection still a thing for new projects in 2024?


Will only show for verified docs now thanks




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: