【 Gener8】点击劫持更改电子邮件地址 https://hackerone.com/reports/783191
【Nord Security】csrf修改密码 https://hackerone.com/reports/204703
【Zenly】通过 SMS 身份验证流程接管帐户 https://hackerone.com/reports/1245762
【Zenly】好友请求流暴露用户数据 https://hackerone.com/reports/1245741
Moodle 的 Shibboleth 中的会话劫持 https://haxolot.com/posts/2022/moodle_pre_auth_shibboleth_rce_part2/
URL 解析混乱,以近 10 万美元伪造 cookie 并利用不可能的 Pickle 反序列化 https://blog.intigriti.com/2022/01/12/bug-bytes-154-url-parsing-confusion-forging-cookies-for-almost-100k-exploiting-impossible-pickle-deserialization/