DEV Community

TECNO Security
TECNO Security

Posted on

E-commerce website vulnerability bounty practice sharing(Ⅱ)

Hello everyone, do you remember the content we shared last time? In the previous article, we shared a case involving a pre-authentication takeover vulnerability and an API security vulnerability (regarding product information leakage) on an e-commerce website. Today, we will continue to share two other vulnerability cases discovered by researcher Injamam, hoping to provide some insights for everyone.

  • API vulnerabilities: Exposing Content of User-Deleted Comments
  • Directory brute forcing leads to information disclosure

Click here to know: E-commerce website vulnerability bounty practice sharing: Pre-Authentication takeover, API security vulnerabilities And Directory Brute Forcing(I)

Takeaways of Bug Bounty
① Be Creative
② Understanding the Application
③ Combining Techniques

Click here to know the details: E-commerce website vulnerability bounty practice sharing: Pre-Authentication takeover, API security vulnerabilities And Directory Brute Forcing(Ⅱ)

Postmark Image

Speedy emails, satisfied customers

Are delayed transactional emails costing you user satisfaction? Postmark delivers your emails almost instantly, keeping your customers happy and connected.

Sign up

Top comments (0)

A Workflow Copilot. Tailored to You.

Pieces.app image

Our desktop app, with its intelligent copilot, streamlines coding by generating snippets, extracting code from screenshots, and accelerating problem-solving.

Read the docs