http://bugbountyhunting.com/?q=keywordThe following are frequently asked questions about common vulnerabilities and security misconfigurations found during bug bounty hunting. Understanding these concepts is crucial for anyone starting their bug hunting journey.
/api/users/:id where an attacker
can fetch data of any user by manipulating the id parameter.