PinnedTanya GoyalAccount takeover through Response ManipulationHello everyone, I am back again with another bug. In this blog, I will discuss a bug that I encountered through response manipulation…Jul 12, 2023Jul 12, 2023
Tanya GoyalHow I found my First Valid bugHello everyone! I am really happy to announce that I got my first valid bug from a target, and not only that, I uncovered two bugs from…Apr 239Apr 239
Tanya GoyalLogical Error leads to DOS for victimHappy new year everyone . I hope you all are doing good . Let’s discuss about my first bug of 2024 which was closed as NA. It’s really sad…Jan 142Jan 142
Tanya GoyalExploiting Exposed .git File to Access Webmail CredentialsHello everyone, I’m back with a new bug. I discovered this issue on a domain that offers free internships to everyone. Despite the absence…Nov 22, 2023Nov 22, 2023
Tanya GoyalUncovering Hidden Likes through Parameter ManipulationHello everyone, welcome back to yet another blog. Thank you so much for showing your love in my previous post. Without any further delay…Aug 10, 20231Aug 10, 20231
Tanya GoyalInside the Invite Function: Uncovering a Potential Vulnerability of Invite UserHello everyone, I hope you are all doing well in your lives. In this blog, I will discuss a business logic flow I found in an invite…Jun 30, 20232Jun 30, 20232
Tanya GoyalUnauthorized access to the Projects | Bug BountySo hello everyone, this is my first medium blog and first blog on bug hunting . So,without any delay, let’s move to today’s blog.Jun 2, 2023Jun 2, 2023