Table of Contents
Bug Bounty Vulnerabilities
1: Account creation without Gmail or Number verification.
2: Vertical Privilege: Vertical privilege escalation occurs when an attacker attempts to gain more permissions or access with an existing account they have compromised.
For example, an attacker takes over a regular user account on a network and attempts to gain administrative permissions or root access.
3: Horizontal Privilege: Horizontal privilege escalation occurs when a user gains the access right to another user who has the same access level as he or she does.


