http://bugbountyhunting.com/?q=keyword140 resources related to stored xss in 2.80 msThe following are frequently asked questions about common vulnerabilities and security misconfigurations found during bug bounty hunting. Understanding these concepts is crucial for anyone starting their bug hunting journey.
/api/users/:id where an attacker
                can fetch data of any user by manipulating the id parameter.