PinnedPublished inCoinsBenchIDOR (Insecure Direct Object Reference)Accessing Arbitrary Customer dataJun 6, 2021Jun 6, 2021
PinnedPublished inCoinsBenchCrypto Flaw — Insecure Direct Object Reference (IDOR)Crypto flaw to access sensitive customer dataJul 11, 20222Jul 11, 20222
OAuth Misconfiguration: How It Works, Common Vulnerabilities, and Exploitation Techniques for…Unveiling the Risks and Shielding Your AccountsMay 171May 171
Functionality Bypass — IDOROTP Bypass to IDOR (Insecure Direct Object Reference)Apr 28, 20222Apr 28, 20222
Need for an Information Security PolicyBefore we talk about the necessity of an Information Security Policy, let me introduce myself, my name is Antara Mane and I’m working as…Oct 16, 2020Oct 16, 2020