google359
bug-bounty345
xss336
facebook280
microsoft270
apple183
exploit175
rce138
csrf84
writeup80
browser73
malware73
account-takeover63
cve62
aws55
react51
sqli48
node46
docker45
smart-contract45
ssrf44
dos43
ethereum43
defi42
web341
access-control40
supply-chain38
oauth38
wordpress37
cloudflare36
phishing35
cloud35
idor34
smart-contract-vulnerability32
pentest32
cors31
auth-bypass31
privilege-escalation30
subdomain-takeover29
solidity27
bragging-post27
clickjacking27
info-disclosure25
race-condition25
lfi24
buffer-overflow23
reverse-engineering21
vulnerability-disclosure18
kubernetes18
ctf17
0
6/10
A security researcher discovered an IDOR vulnerability in an e-commerce platform where unauthorized access to user account data (name, address, credit card details) could be achieved by exploiting misconfigured CORS that exposed random checkout hashes to third-party integrations, allowing attackers to enumerate and access arbitrary user wallets via predictable endpoints.
cors
idor
pii-disclosure
authorization-bypass
information-disclosure
e-commerce
business-logic
hash-enumeration
third-party-integration
Harsh Parekh
notmarshmllow
0
security
0
authentication
0
vulnerability
0
0
0
0
0
0
0
security
0
authentication
0
0
0
bug-bounty
0
authentication
0
vulnerability
0
vulnerability
0
vulnerability
0
vulnerability
0
vulnerability
0
vulnerability
0
0
0
0
0
0
0
security