Published il y a 6 jours
Hi, This is DevSecure Team
,we specialize in uncovering hidden vulnerabilities that pose real-world risks to modern web applications.
All vulnerabilities shared in these write-ups are fully redacted — any company names, domains, or sensitive details are replaced with placeholders such as company.com. Each finding was responsibly disclosed through the Intigriti platform and has been verified and resolved by the affected vendor.
Every post represents our commitment to ethical hacking, responsible disclosure, and continuous learning, helping organizations strengthen their defenses while contributing to a safer global cybersecurity ecosystem.
Affected Parameter / Endpoint: https://app.company.com/api/s/youraccountid/user/?id=youraccountid&userId=anyuserid
https://app.company.com/api/s/youraccountid/user/?id=youraccountid&userId=anyuserid and you will get 27000 user emails and names and ids {"id":"450xxxxxxxxxxxxx","username":"drxxxxxxxxxxxxxxx3@gmail.com","first":"Nxxxx","last":"kxxx"} High — PII Leak.
Description: in one of the earlier target that i hunted in before, after the recon step, i found an interesting service...
Read More →
Description: Broken access control IDOR lead to get all invoices for any customer Affected Parameter / Endpoint: https...
Read More →
Description: i found a vulnerability thats make me able to extract all employees documents thats has sensitive informat...
Read More →