Ir al contenido
cyberhub.es
  • Home
  • CTFs resueltos
    • PicoCTF
      • PicoCTF 2025 writeup
      • PicoCTF 2024 writeup
  • PortSwigger Lab Writeups
  • Home
  • CTFs resueltos
    • PicoCTF
      • PicoCTF 2025 writeup
      • PicoCTF 2024 writeup
  • PortSwigger Lab Writeups

Categoría: Business logic vulnerabilities

Infinite money logic flaw

Authentication bypass via encryption oracle

Authentication bypass via flawed state machine

Insufficient workflow validation

Weak isolation on dual-use endpoint

Inconsistent handling of exceptional input

Low-level logic flaw

Flawed enforcement of business rules

Inconsistent security controls

High-level logic vulnerability

Siguiente →
cyberhub.es
  • Política de Cookies

Todos los derechos reservados