Cyber Security / Ethical Hacking
Ctrl
K
Copy
Web App Pentesting
Broken Acess Controls
Insecure direct object references (IDOR)
Previous
Vulnerabilities in other authentication mechanisms
Next
Insecure direct object references (IDOR)
Last updated
4 years ago
Was this helpful?