Critical OTP Bypass Vulnerability leads to Phone Number TakeoverIn this write-up, we will explore a critical vulnerability — an OTP (One-Time Password) bypass that can be exploited to gain unauthorized…Oct 10, 20241Oct 10, 20241
Critical IDOR Vulnerability leads to PII leakageDisclaimer : I came across this bug report on HackerOne (not my own) and I wanted to clarify and showcase it for educational reasons.Oct 10, 2024Oct 10, 2024