Answer:
Attackers can modify data using IDOR by manipulating object references in requests to modify data intended for other users.
Attackers can modify data using IDOR by manipulating object references in requests to modify data intended for other users.
You may be interested in:
Web Security MCQs