Bug Bounty — Advanced Manual Penetration Testing Leading to Price Manipulation Vulnerability

INTRODUCTION

Figure 1: Request Vulnerable to Price Manipulation
Figure 2: JS code to generate token

CONCLUSION:

Ethical Hacker | Bug Bounty Hunter | Freelancer