BOOK THIS SPACE FOR AD
ARTICLE ADI searched for an extensive guide to the permissions of each type of user on the site and began to implement everything that is not allowed, through manipulation or even logic.
Ref:
1. [CompanyName] Roles & Permissions:
https://[*].[Redacted].com/hc/en-us/articles/Redacted-Redacted-Roles-Permissions
2. The different user roles in [CompanyName]:
https://[Redacted].zendesk.com/hc/en-us/articles/[Redacted]-The-different-user-roles-in-[Redacted]
3. From roles
More than 6 months ago, in the same program, I submitted more than 18 vulnerabilities, but unfortunately 9 of them were duplicates and 2 were acceptable.
But I started to change the way I found security vulnerabilities.