Nov. 21, 2023, 4:05 a.m. | Abhi Sharma

InfoSec Write-ups - Medium infosecwriteups.com

Discover how an IDOR vulnerability allowed unauthorized budget changes in Private Program. Learn the steps to reproduce this security flaw and its potential impact on user privacy.

IDOR vulnerabilities can potentially expose user data or allow unauthorized access to sensitive features. In this blog post, I’ll walk you through a recent discovery I made while testing Examlent.com(virtual name of privat program domain), a platform where individuals seek job opportunities and employers find potential candidates. This IDOR flaw had the potential …

access blog blog post budget bug bug bounty change cybersecurity data discover discovery expose features flaw hacking idor idor vulnerability impact learn privacy private program programming security security flaw sensitive testing unauthorized access user data user privacy vulnerabilities vulnerability

Security Specialist

@ Protect Democracy | Remote, US

Environmental Compliance Lead

@ EDF Energy | Bristol, GB

IT Consultant Network w/m/d Wireless (WiFi6, Mobilfunk 5G)

@ Computacenter | Berlin, DE, 12099

Senior - Cyber Infrastructure Protection

@ Deloitte | Madrid, España

GRC (Governance, Risk & Compliance) | 4 to 6 Years | Mumbai, Bengaluru & Chennai

@ Capgemini | Bengaluru, MH, IN

Technology Risk & Controls Advisory - Experienced Consultant

@ Wavestone | London, United Kingdom