Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO

F013. Insecure object reference

Description

The system’s authorization mechanism does not prevent one user from accessing another user’s data by modifying the key value that identifies it.


Service status - Terms of Use