Logical Breach

LogicalBreach Academy

SQL Injection on api.redacted-target.com through /api/v1/auth/login via POST parameter "module" leads to Sensitive Data Exposure and Remote Code Execution | Free Bug Bounty Writeup | LogicalBreach Academy