write-ups
How i found a Privilege Escalation via Impersonation Features featureHow I was able to discover ATO Via IDOR vulnerabilityEasy full Account Takeover via Facebook OAuth Misconfiguration
PreviousLinux Privilege EscalationNextHow i found a Privilege Escalation via Impersonation Features feature
Last updated