Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.
What is the API vulnerability revealed in the above scenario?
Sam_Fyl
Highly Voted 1 year, 6 months agolawbut2
1 year, 5 months agofoicram
Highly Voted 1 year, 2 months agoDaniel8660
Most Recent 6 months, 2 weeks agovolatile
10 months agoTasadar92
1 year agoQudaz
1 year, 2 months agoegz21
1 year, 3 months agoSilascarter
1 year, 5 months agoalissonloyola
1 year, 5 months agobrdweek
1 year, 5 months agoQ0ne
1 year, 7 months agoholasya
1 year, 7 months agoClauu
1 year, 7 months agoScryptic
1 year, 7 months ago