GithubHelp home page GithubHelp logo

hackerbone / encredx-react Goto Github PK

View Code? Open in Web Editor NEW
0.0 0.0 0.0 595 KB

EncredX Recreated in React.js | Firebase

Home Page: https://encredx-react.herokuapp.com

HTML 4.13% JavaScript 84.53% SCSS 10.67% CSS 0.67%

encredx-react's Introduction

An image of @hackerbone's Holopin badges, which is a link to view their full Holopin profile

Look who's here ๐Ÿ‘€, Welcome to my Github Profile ๐Ÿ‘‹

  • ๐Ÿ”ญ Iโ€™m currently gaining knowledge in DevOps
  • ๐Ÿ‘ฏ Iโ€™m looking to collaborate on Web Development / DevOps Projects
  • ๐Ÿ’ฌ Ask me about anything
  • โšก Fun fact: (Wubba Lubba Dub Dub ๐Ÿ‘Œ) and I'm a Violinist ๐ŸŽป

Linkedin: sitaraman-s-b4647375 GitHub hackerbone website

Readme Image

Github Streak


encredx-react's People

Contributors

hackerbone avatar

Watchers

 avatar

encredx-react's Issues

Unsafe Cross-Origin Resource Sharing

Report Submission Template

Description:

[Replace this with a high-level summary about this vulnerability, and the security implications of exploiting it]

Security Impact

[To the best of your understanding, describe what the actual security impact is with this report]

Steps To Reproduce:

[Replace this with a description of any pre-conditions that are necessary to make the exploit work, and the specific steps we'll need to reproduce it. Include specific URLs, payloads, etc in the steps below. Please write out the steps here in text, rather than uploading a video/PDF/etc. You can create a video describing your VPN and the tools you used and upload it to YouTube (make it private) and embed the link here. If you're not fluent in English, you can write in your native language and then translate it to English]. Using proper formatting -- like wrapping code in back-ticks -- makes your report easier to understand.]

  1. [Describe step 1]
  2. [Describe step 2]
  3. [Describe step 3]

Specifics

  • If applicable, what account were you using to test?
  • e.g. [email protected]
  • If applicable, what domain(s) does this vulnerability affect?
  • e.g. api.*****.com
  • Does this only affect specific versions or vendors?
  • e.g. Chrome - Version 54.0.2840.98 (64-bit)

Recommendations

[Replace this with any advice about the best way to fix the bug]

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.