Computer Science, asked by sandyachar88, 3 months ago

A reputed MNC suffered from a Cyber attack where the hackers logged into the web applications as regular users by stealing
credentials through social engineering sites. After exploring the functionality of a regular user, the hackers were then able to access the
admin page by simply changing the URL or a parameter. The hackers made lot of unauthorized changes through this admin account.
Which of following OWASP vulnerability is the cause of the above attack?​

Answers

Answered by llMrSharmall
8

Answer:

\huge{\underline{\underline{\boxed{\sf{\pink{Answer ࿐}}}}}}

He carried it in his arms even though he was tired. On reaching home, he gave it the milk that was meant for him. When he saw that the fawn did not drink the milk kept in the gourd, he fed it with his own hands. Hence, one can say that Jody carried out his responsibility quite well.

Answered by Anonymous
17

\huge{\underline{\underline{\boxed{\sf{\red{Answer ࿐}}}}}}

He carried it in his arms even though he was tired. On reaching home, he gave it the milk that was meant for him. When he saw that the fawn did not drink the milk kept in the gourd, he fed it with his own hands. Hence, one can say that Jody carried out his responsibility quite well

Similar questions