Critical IDOR Vulnerability in Order Tracking System Exposes Customer DataWhile reading blogs on Bug Bounty, I found a blog from coffinxp which was about Full Potential of the waybackmachine. After reading blog, I…Mar 51Mar 51
Stored CSRF via Uploaded HTML File in User Account Document SectionDuring my internship, I was assigned the task of finding vulnerabilities in a CRM system. My approach involved testing each functionality…Jan 13Jan 13
Authentication Bypass Techniques in Web Applications: A Guide for Bug Bounty HuntersIntroduction: Authentication is crucial for protecting sensitive information in web applications, ensuring only authorized users have…Nov 4, 2024Nov 4, 2024