bug-bounty404
google393
xss350
microsoft305
facebook274
apple184
exploit182
rce174
malware136
cve107
account-takeover94
csrf86
browser85
writeup69
privilege-escalation66
phishing61
dos60
react59
supply-chain56
bragging-post54
authentication-bypass53
node51
cloudflare51
ssrf49
aws48
docker48
access-control46
smart-contract45
reverse-engineering45
web344
ethereum43
defi42
pentest41
oauth41
sql-injection40
lfi36
idor35
race-condition33
info-disclosure33
smart-contract-vulnerability32
cloud31
buffer-overflow30
wordpress29
auth-bypass29
clickjacking29
subdomain-takeover27
solidity27
vulnerability-disclosure25
web-application24
sqli23
0
5/10
An IDOR vulnerability in an e-commerce application's address management API allowed exposure of other users' sensitive information (names, addresses, phone numbers) through a POST request to set default address endpoint that returned 200 with empty body but still processed sequential address IDs. The vulnerability was discovered when the payment page displayed a different user's address data.
idor
access-control
e-commerce
information-disclosure
api-vulnerability
session-validation-bypass
http-method-testing
Rahul Varale