This HTML5 document contains 34 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dbpedia-lmohttp://lmo.dbpedia.org/resource/
dctermshttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
foafhttp://xmlns.com/foaf/0.1/
n9https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
dbphttp://dbpedia.org/property/
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Insecure_direct_object_reference
rdfs:label
Insecure direct object reference
rdfs:comment
Insecure direct object reference (IDOR) is a type of access control vulnerability in digital security. This can occur when a web application or application programming interface uses an identifier for direct access to an object in an internal database but does not check for access control or authentication. For example, if the request URL sent to a web site directly uses an easily enumerated unique identifier (such as http://foo.com/doc/1234), that can provide an exploit for unintended access to all records. A directory traversal attack is considered a special case of a IDOR.
dcterms:subject
dbc:Hacking_(computer_security) dbc:Web_security_exploits
dbo:wikiPageID
66362975
dbo:wikiPageRevisionID
1113874738
dbo:wikiPageWikiLink
dbr:Application_programming_interface dbr:United_States_Department_of_Defense dbr:Directory_traversal_attack dbr:Social_networking dbr:Authentication_in_web dbr:Vulnerability dbr:URL dbr:Web_application dbc:Hacking_(computer_security) dbc:Web_security_exploits dbr:Parler dbr:Open_Web_Application_Security_Project dbr:Access_control dbr:Database
owl:sameAs
n9:FdVyN dbpedia-lmo:Insecure_direct_object_reference wikidata:Q104792366
dbp:wikiPageUsesTemplate
dbt:Short_description dbt:Computer-security-stub dbt:Reflist
dbo:abstract
Insecure direct object reference (IDOR) is a type of access control vulnerability in digital security. This can occur when a web application or application programming interface uses an identifier for direct access to an object in an internal database but does not check for access control or authentication. For example, if the request URL sent to a web site directly uses an easily enumerated unique identifier (such as http://foo.com/doc/1234), that can provide an exploit for unintended access to all records. A directory traversal attack is considered a special case of a IDOR. The vulnerability is of such significant concern that for many years it was listed as one of the Open Web Application Security Project’s (OWASP) Top 10 vulnerabilities.
prov:wasDerivedFrom
wikipedia-en:Insecure_direct_object_reference?oldid=1113874738&ns=0
dbo:wikiPageLength
3987
foaf:isPrimaryTopicOf
wikipedia-en:Insecure_direct_object_reference
Subject Item
dbr:Directory_traversal_attack
dbo:wikiPageWikiLink
dbr:Insecure_direct_object_reference
Subject Item
dbr:IDOR
dbo:wikiPageWikiLink
dbr:Insecure_direct_object_reference
dbo:wikiPageRedirects
dbr:Insecure_direct_object_reference
Subject Item
wikipedia-en:Insecure_direct_object_reference
foaf:primaryTopic
dbr:Insecure_direct_object_reference