Against Back-End System ยท Intro: This vulnerability allows an attacker to force the server side of a web application to make requests to normally...
Intro: This vulnerability allows an attacker to force the server side of a web application to make requests to normally unauthorized...
Intro: 2FA a.k.a 2 factor authentication is an authentication process in which a user goes through more than one type of authentication method in...
Intro: Enumeration is a process in cybersecurity through which detailed information can be gathered about a target. Username enumeration is...
Intro: This type of escalation is a combination of both horizontal, and vertical privilege escalation. First, an attacker gains access to an standard...
An access control vulnerability when a non-administrative user can see another users personal information with similiar privileges. An example would...