Submitter : c2a
Date: 3 August 2021
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://yashswarup12.medium.com/how-the-use-of-hidden-form-fields-lead-to-email-verification-bypass-3c8d7c25bd31