writeups.xyz
/
Keizo (@KeiZo_Zo)
Title
Vulnerabilities
Programs
Authors
Using E-Notation to bypass Access Control restrictions to access arbitrary user PII-discussions
IDOR
Broken Access Control
Undisclosed
Keizo (@KeiZo_Zo)
Race Condition Authentication Bypass leads to Full Account Takeover
Race Condition
Authentication Bypass
Account Takeover
Undisclosed
Keizo (@KeiZo_Zo)
Page 1 of 1