Published inInfoSec Write-upsHow to Write an Effective Bug Bounty Report: Tips, Structure, and ExamplesIn the bug bounty world, the quality of your report can make or break your submission. The finding a bug is the first step but writing a…Sep 133Sep 133
Published inInfoSec Write-upsUnauthorized Deletion of Forms by Low-Level Unlicensed Users: A 500$ Access Control BugAug 243Aug 243
Published inInfoSec Write-ups$800 Improper Authorization Flaw: Unauthorized Project Reclaiming Post TransferAug 102Aug 102