Thanks for the writeup. Can you explain:
1. Can you explain the actual impact of this vulnerability?
2. Also let me know If every user's information is being stored in cache and accessible to an attacker ?or the only logged in user's information is being saved in the cache?
Thanks in advance.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Muneeb Alam Khan
Muneeb Alam Khan

Written by Muneeb Alam Khan

Testing web & mobile applications.

Responses (2)

Write a response