Stored CSRF via Uploaded HTML File in User Account Document SectionDuring my internship, I was assigned the task of finding vulnerabilities in a CRM system. My approach involved testing each functionality…Jan 13Jan 13
Authentication Bypass Techniques in Web Applications: A Guide for Bug Bounty HuntersIntroduction: Authentication is crucial for protecting sensitive information in web applications, ensuring only authorized users have…Nov 4, 2024Nov 4, 2024