Business Logic Vulnerability in the Report Invoice Feature, Which an Unauthorized User can make a Fake Report to Dicoding.com

--

--

--

Pemburu Bug & Pengujian Penetrasi

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aidil Arief

Aidil Arief

Pemburu Bug & Pengujian Penetrasi

More from Medium

Intigriti — XSS Challenge — April 2022 — Bug Bounty Hunting — Writeup

Internet-Wide Study: State Of SPF, DKIM, And DMARC — RedHunt Labs

IDOR leads to 2fa Bypass

Part 1: A pragmatic guide to building your bug bounty program