Hello Fellows,
In this article, I will demonstrate a vulnerability idea that I have encountered multiple times lately during penetration tests and bug bounty, you can make use of it and include it in your methodology. Apparently, some organizations are separating their web and mobile applications, while the business and…