http://bugbountyhunting.com/?q=keyword
The following are frequently asked questions about common vulnerabilities and security misconfigurations found during bug bounty hunting. Understanding these concepts is crucial for anyone starting their bug hunting journey.
/api/users/:id
where an attacker
can fetch data of any user by manipulating the id
parameter.