Answer:
If an attacker can access resources belonging to other users without proper authorization, it indicates a successful exploitation of an IDOR vulnerability.
If an attacker can access resources belonging to other users without proper authorization, it indicates a successful exploitation of an IDOR vulnerability.
You may be interested in:
Web Security MCQs