上QQ阅读APP看书,第一时间看更新
Key learning from this report
- These were very simple SQL injections that were identified with less effort and attracted decent bounties
- Reporters focused on the exploitation parts and were rewarded for that, which tells us that, in critical vulnerabilities, exploitation is the key