Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources in the system directly, for example database records or files.
-
5695 Sales $89
-
4107 Sales $49
-
10915 Sales $79
-
1467 Sales $29
-
1211 Sales $60
-
1716 Sales $59
-
10000 Sales $79
-
352 Sales $60
-
57 Sales $54
-
1766 Sales $59
-
2615 Sales $79