<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — IDOR</title>
  <link>https://appsec.fyi/idor.html</link>
  <description>Curated IDOR resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/idor.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Tue, 14 Apr 2026 16:08:27 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>IDOR - PortSwigger Web Security</title>
    <link>https://portswigger.net/web-security/access-control/idor</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/access-control/idor</guid>
    <description>IDOR - PortSwigger Web Security</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:40 +0000</pubDate>
  </item>
  <item>
    <title>IDOR - OWASP Foundation</title>
    <link>https://owasp.org/www-community/attacks/insecure_direct_object_reference</link>
    <guid isPermaLink="true">https://owasp.org/www-community/attacks/insecure_direct_object_reference</guid>
    <description>IDOR - OWASP Foundation</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:39 +0000</pubDate>
  </item>
  <item>
    <title>Learn about IDOR - BugBountyHunter.com</title>
    <link>https://www.bugbountyhunter.com/vulnerability/?type=idor</link>
    <guid isPermaLink="true">https://www.bugbountyhunter.com/vulnerability/?type=idor</guid>
    <description>Learn about IDOR - BugBountyHunter.com</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:38 +0000</pubDate>
  </item>
  <item>
    <title>How-To: Find IDOR Vulnerabilities for Large Bounty Rewards</title>
    <link>https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards/</link>
    <guid isPermaLink="true">https://www.bugcrowd.com/blog/how-to-find-idor-insecure-direct-object-reference-vulnerabilities-for-large-bounty-rewards/</guid>
    <description>How-To: Find IDOR Vulnerabilities for Large Bounty Rewards</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:37 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting: Insecure Direct Object References</title>
    <link>https://medium.com/@NiaziSec/bug-bounty-hunting-web-vulnerability-insecure-direct-object-references-a39038e8f7a3</link>
    <guid isPermaLink="true">https://medium.com/@NiaziSec/bug-bounty-hunting-web-vulnerability-insecure-direct-object-references-a39038e8f7a3</guid>
    <description>Bug Bounty Hunting: Insecure Direct Object References</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:36 +0000</pubDate>
  </item>
  <item>
    <title>How I Found Easy IDOR: Bug Bounty Writeup</title>
    <link>https://medium.com/@rajankumarbarik143/how-i-found-easy-5-000-idor-bug-bounty-writeup-p3-27348656c4cd</link>
    <guid isPermaLink="true">https://medium.com/@rajankumarbarik143/how-i-found-easy-5-000-idor-bug-bounty-writeup-p3-27348656c4cd</guid>
    <description>How I Found Easy IDOR: Bug Bounty Writeup</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:35 +0000</pubDate>
  </item>
  <item>
    <title>HackerOne Report: IDOR Allows Viewing</title>
    <link>https://hackerone.com/reports/2487889</link>
    <guid isPermaLink="true">https://hackerone.com/reports/2487889</guid>
    <description>HackerOne Report: IDOR Allows Viewing</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:55:34 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-67274: Broken Access Control BOLA in aangine</title>
    <link>https://gist.github.com/c4m0uflag3/26fec868b764c4e7314ad246bab01c88</link>
    <guid isPermaLink="true">https://gist.github.com/c4m0uflag3/26fec868b764c4e7314ad246bab01c88</guid>
    <description>CVE-2025-67274: Broken Access Control BOLA in aangine</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:12 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33312: BOLA in Vikunja Project</title>
    <link>https://cvereports.com/reports/CVE-2026-33312</link>
    <guid isPermaLink="true">https://cvereports.com/reports/CVE-2026-33312</guid>
    <description>CVE-2026-33312: BOLA in Vikunja Project</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:11 +0000</pubDate>
  </item>
  <item>
    <title>IDOR Prevention Cheat Sheet</title>
    <link>https://cheatsheetseries.owasp.org/cheatsheets/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet.html</link>
    <guid isPermaLink="true">https://cheatsheetseries.owasp.org/cheatsheets/Insecure_Direct_Object_Reference_Prevention_Cheat_Sheet.html</guid>
    <description>IDOR Prevention Cheat Sheet</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:10 +0000</pubDate>
  </item>
  <item>
    <title>IDOR Writeup TryHackMe</title>
    <link>https://seclak07.medium.com/idor-insecure-direct-object-reference-b5f8ec5f65d7</link>
    <guid isPermaLink="true">https://seclak07.medium.com/idor-insecure-direct-object-reference-b5f8ec5f65d7</guid>
    <description>IDOR Writeup TryHackMe</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:10 +0000</pubDate>
  </item>
  <item>
    <title>What is IDOR? Complete Guide</title>
    <link>https://www.varonis.com/blog/what-is-idor-insecure-direct-object-reference</link>
    <guid isPermaLink="true">https://www.varonis.com/blog/what-is-idor-insecure-direct-object-reference</guid>
    <description>What is IDOR? Complete Guide</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:09 +0000</pubDate>
  </item>
  <item>
    <title>IDOR - MDN Web Security</title>
    <link>https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/IDOR</link>
    <guid isPermaLink="true">https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/IDOR</guid>
    <description>IDOR - MDN Web Security</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:08 +0000</pubDate>
  </item>
  <item>
    <title>Flowise IDOR &amp; Business Logic Flaw (CVE-2025)</title>
    <link>https://dailycve.com/flowise-insecure-direct-object-reference-idor-business-logic-flaw-cve-2025-xxxx-critical/</link>
    <guid isPermaLink="true">https://dailycve.com/flowise-insecure-direct-object-reference-idor-business-logic-flaw-cve-2025-xxxx-critical/</guid>
    <description>Flowise IDOR &amp; Business Logic Flaw (CVE-2025)</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:07 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Direct Object Reference (IDOR) - A Deep Dive</title>
    <link>https://hadrian.io/blog/insecure-direct-object-reference-idor-a-deep-dive</link>
    <guid isPermaLink="true">https://hadrian.io/blog/insecure-direct-object-reference-idor-a-deep-dive</guid>
    <description>Insecure Direct Object Reference (IDOR) - A Deep Dive</description>
    <category>IDOR</category>
    <pubDate>Fri, 10 Apr 2026 01:43:07 +0000</pubDate>
  </item>
  <item>
    <title>Web Application Security Testing: A Step-by-Step Learning Guide</title>
    <link>https://tryhackme.com/resources/blog/web-application-security-testing-a-step-by-step-learning-guide</link>
    <guid isPermaLink="true">https://tryhackme.com/resources/blog/web-application-security-testing-a-step-by-step-learning-guide</guid>
    <description>Web Application Security Testing: A Step-by-Step Learning Guide</description>
    <category>IDOR</category>
    <pubDate>Mon, 06 Apr 2026 02:00:53 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33030: Nginx UI Authorization Bypass</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-33030/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-33030/</guid>
    <description>CVE-2026-33030: Nginx UI Authorization Bypass</description>
    <category>IDOR</category>
    <pubDate>Mon, 06 Apr 2026 02:00:52 +0000</pubDate>
  </item>
  <item>
    <title>GraphQL Security: How I Found and Exploited Critical IDOR and Authorization Bypass</title>
    <link>https://infosecwriteups.com/graphql-security-how-i-found-and-exploited-critical-idor-and-authorization-bypass-in-a-42ab78e13642</link>
    <guid isPermaLink="true">https://infosecwriteups.com/graphql-security-how-i-found-and-exploited-critical-idor-and-authorization-bypass-in-a-42ab78e13642</guid>
    <description>GraphQL Security: How I Found and Exploited Critical IDOR and Authorization Bypass</description>
    <category>IDOR</category>
    <pubDate>Mon, 06 Apr 2026 02:00:50 +0000</pubDate>
  </item>
  <item>
    <title>BugQuest 2026: 31 Days of Broken Access Control</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/bugquest-2026-31-days-of-broken-access-control</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/bugquest-2026-31-days-of-broken-access-control</guid>
    <description>BugQuest 2026: 31 Days of Broken Access Control</description>
    <category>IDOR</category>
    <pubDate>Mon, 06 Apr 2026 02:00:49 +0000</pubDate>
  </item>
  <item>
    <title>Nginx UI IDOR Allows Cross-User Resource Access</title>
    <link>https://www.thehackerwire.com/nginx-ui-idor-allows-cross-user-resource-access/</link>
    <guid isPermaLink="true">https://www.thehackerwire.com/nginx-ui-idor-allows-cross-user-resource-access/</guid>
    <description>Nginx UI IDOR Allows Cross-User Resource Access</description>
    <category>IDOR</category>
    <pubDate>Mon, 06 Apr 2026 02:00:48 +0000</pubDate>
  </item>
  <item>
    <title>IDOR | HackTricks</title>
    <link>https://book.hacktricks.xyz/pentesting-web/idor</link>
    <guid isPermaLink="true">https://book.hacktricks.xyz/pentesting-web/idor</guid>
    <description>IDOR | HackTricks</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:15 +0000</pubDate>
  </item>
  <item>
    <title>IDOR Attack Guide | Hackviser</title>
    <link>https://hackviser.com/tactics/pentesting/web/idor</link>
    <guid isPermaLink="true">https://hackviser.com/tactics/pentesting/web/idor</guid>
    <description>IDOR Attack Guide | Hackviser</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:14 +0000</pubDate>
  </item>
  <item>
    <title>Real Bug Bounty Report: IDOR Used to Exploit a Banking Application</title>
    <link>https://www.webasha.com/blog/what-is-an-example-of-a-real-bug-bounty-report-where-idor-was-used-to-exploit-a-banking-application</link>
    <guid isPermaLink="true">https://www.webasha.com/blog/what-is-an-example-of-a-real-bug-bounty-report-where-idor-was-used-to-exploit-a-banking-application</guid>
    <description>Real Bug Bounty Report: IDOR Used to Exploit a Banking Application</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:08 +0000</pubDate>
  </item>
  <item>
    <title>Reddit Bug Bounty: Exploiting an IDOR Vulnerability in Dubsmash&#x27;s API</title>
    <link>https://www.appsecure.security/blog/reddit-bug-bounty-writeup-exploiting-an-idor-vulnerability</link>
    <guid isPermaLink="true">https://www.appsecure.security/blog/reddit-bug-bounty-writeup-exploiting-an-idor-vulnerability</guid>
    <description>Reddit Bug Bounty: Exploiting an IDOR Vulnerability in Dubsmash&#x27;s API</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:04 +0000</pubDate>
  </item>
  <item>
    <title>IDOR: The $1 Billion Authorization Bug</title>
    <link>https://medium.com/@instatunnel/insecure-direct-object-references-idor-the-1-billion-authorization-bug-cfc342ba428a</link>
    <guid isPermaLink="true">https://medium.com/@instatunnel/insecure-direct-object-references-idor-the-1-billion-authorization-bug-cfc342ba428a</guid>
    <description>IDOR: The $1 Billion Authorization Bug</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:03 +0000</pubDate>
  </item>
  <item>
    <title>IDOR Vulnerability: Analysis, Impact, Mitigation | Huntress</title>
    <link>https://www.huntress.com/threat-library/vulnerabilities/idor</link>
    <guid isPermaLink="true">https://www.huntress.com/threat-library/vulnerabilities/idor</guid>
    <description>IDOR Vulnerability: Analysis, Impact, Mitigation | Huntress</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:02 +0000</pubDate>
  </item>
  <item>
    <title>How to Find IDOR Vulnerabilities: The Bug Bounty Hunter&#x27;s Practical Guide</title>
    <link>https://dev.to/kai_learner/how-to-find-idor-vulnerabilities-the-bug-bounty-hunters-practical-guide-46o8</link>
    <guid isPermaLink="true">https://dev.to/kai_learner/how-to-find-idor-vulnerabilities-the-bug-bounty-hunters-practical-guide-46o8</guid>
    <description>How to Find IDOR Vulnerabilities: The Bug Bounty Hunter&#x27;s Practical Guide</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:54:01 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Direct Object References (IDOR) | Intigriti Hackademy</title>
    <link>https://www.intigriti.com/researchers/hackademy/idor</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/hackademy/idor</guid>
    <description>Insecure Direct Object References (IDOR) | Intigriti Hackademy</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:53:58 +0000</pubDate>
  </item>
  <item>
    <title>IDOR in 2025: Why Broken Access Control Still Rules the Vulnerability Charts</title>
    <link>https://medium.com/@skrumf/idor-in-2025-why-broken-access-control-still-rules-the-vulnerability-charts-with-real-world-d09439eaa29b</link>
    <guid isPermaLink="true">https://medium.com/@skrumf/idor-in-2025-why-broken-access-control-still-rules-the-vulnerability-charts-with-real-world-d09439eaa29b</guid>
    <description>IDOR in 2025: Why Broken Access Control Still Rules the Vulnerability Charts</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:53:56 +0000</pubDate>
  </item>
  <item>
    <title>IDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | Intigriti</title>
    <link>https://www.intigriti.com/blog/news/idor-a-complete-guide-to-exploiting-advanced-idor-vulnerabilities</link>
    <guid isPermaLink="true">https://www.intigriti.com/blog/news/idor-a-complete-guide-to-exploiting-advanced-idor-vulnerabilities</guid>
    <description>IDOR: A Complete Guide to Exploiting Advanced IDOR Vulnerabilities | Intigriti</description>
    <category>IDOR</category>
    <pubDate>Fri, 03 Apr 2026 15:53:54 +0000</pubDate>
  </item>
  <item>
    <title>How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs) 🤖🔍</title>
    <link>https://infosecwriteups.com/how-i-made-burp-suite-my-idor-finding-robot-butler-and-found-20-bugs-2c5a9edd370d</link>
    <guid isPermaLink="true">https://infosecwriteups.com/how-i-made-burp-suite-my-idor-finding-robot-butler-and-found-20-bugs-2c5a9edd370d</guid>
    <description>The content titled &quot;How I Made Burp Suite My IDOR-Finding Robot Butler (And Found 20+ Bugs)&quot; likely discusses utilizing the Burp Suite tool to automate the discovery of Insecure Direct Object Reference (IDOR) vulnerabilities, leading to the identification of over 20 bugs. The author shares their experience and strategies for leveraging Burp Suite effectively in bug hunting. The content may provide insights into the process of using automation tools for security testing and the successful outcomes achieved through this approach.</description>
    <category>IDOR</category>
    <pubDate>Thu, 29 Jan 2026 15:56:42 +0000</pubDate>
  </item>
  <item>
    <title>TrinetLayer</title>
    <link>https://trinetlayer.com/homepage</link>
    <guid isPermaLink="true">https://trinetlayer.com/homepage</guid>
    <description>TrinetLayer is a proven tool used by hackers for vulnerability research, real-world exploit payloads, and modern attack techniques. It is trusted within the hacking community for its effectiveness and reliability.</description>
    <category>IDOR</category>
    <pubDate>Mon, 19 Jan 2026 00:15:28 +0000</pubDate>
  </item>
  <item>
    <title>devanshbatham/Vulnerabilities-Unmasked</title>
    <link>https://github.com/devanshbatham/Vulnerabilities-Unmasked</link>
    <guid isPermaLink="true">https://github.com/devanshbatham/Vulnerabilities-Unmasked</guid>
    <description>The content provided is a GitHub repository named &quot;Vulnerabilities-Unmasked&quot; created by a user named devanshbatham. The repository likely contains information or code related to vulnerabilities. However, without further details or access to the repository, it is not possible to provide a more detailed summary of its contents.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:42 +0000</pubDate>
  </item>
  <item>
    <title>?‍?Roadmap to Cybersecurity in 2022, Full-Read SSRF, IDOR in GraphQL, GCP P</title>
    <link>https://medium.com/bugbountywriteup/roadmap-to-cybersecurity-in-2022-full-read-ssrf-idor-in-graphql-gcp-pentesting-and-much-74d2d906f7d7</link>
    <guid isPermaLink="true">https://medium.com/bugbountywriteup/roadmap-to-cybersecurity-in-2022-full-read-ssrf-idor-in-graphql-gcp-pentesting-and-much-74d2d906f7d7</guid>
    <description>The content mentions a roadmap to cybersecurity in 2022, focusing on topics like Full-Read SSRF, IDOR in GraphQL, and GCP P. It suggests a plan or guide for enhancing cybersecurity practices in the upcoming year, highlighting specific areas of concern and potential vulnerabilities to address. The content seems to offer insights or strategies related to cybersecurity trends and challenges for the year ahead, including the importance of understanding SSRF, IDOR, and GCP security measures.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:40 +0000</pubDate>
  </item>
  <item>
    <title>https://www.aon.com/cyber-solutions/aon_cyber_labs/finding-more-idors-tips-and-tricks/</title>
    <link>https://www.aon.com/cyber-solutions/aon_cyber_labs/finding-more-idors-tips-and-tricks/</link>
    <guid isPermaLink="true">https://www.aon.com/cyber-solutions/aon_cyber_labs/finding-more-idors-tips-and-tricks/</guid>
    <description>The content discusses tips and tricks for finding more Insecure Direct Object References (IDORs) in web applications. It emphasizes the importance of identifying and addressing IDOR vulnerabilities to enhance cybersecurity. The article provides insights into common IDOR scenarios, tools for detecting IDORs, and strategies for mitigating these risks. By understanding and proactively addressing IDOR vulnerabilities, organizations can strengthen their cybersecurity posture and protect sensitive data from unauthorized access.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:33 +0000</pubDate>
  </item>
  <item>
    <title>Jobert Abma on Twitter: &quot;Hacker tip: when you’re looking for IDORs in a mod</title>
    <link>https://twitter.com/jobertabma/status/1222194853066358784</link>
    <guid isPermaLink="true">https://twitter.com/jobertabma/status/1222194853066358784</guid>
    <description>Jobert Abma shared a hacker tip on Twitter about finding IDORs in a mod. This tweet suggests that Jobert Abma is providing advice or guidance related to hacking techniques, specifically focusing on Insecure Direct Object References (IDORs) within a mod. The content is concise and implies that Jobert Abma may be sharing insights on exploiting security vulnerabilities in software or applications.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:29 +0000</pubDate>
  </item>
  <item>
    <title>A Less Known Attack Vector, Second Order IDOR Attacks</title>
    <link>https://blog.usejournal.com/a-less-known-attack-vector-second-order-idor-attacks-14468009781a</link>
    <guid isPermaLink="true">https://blog.usejournal.com/a-less-known-attack-vector-second-order-idor-attacks-14468009781a</guid>
    <description>The content discusses Second Order Insecure Direct Object Reference (IDOR) attacks, which are a lesser-known attack vector. These attacks involve exploiting vulnerabilities in an application&#x27;s logic to manipulate indirect references to objects and access unauthorized data. Second Order IDOR attacks can be more complex and challenging to detect compared to traditional IDOR attacks. Understanding and mitigating these types of attacks are crucial for enhancing the security of web applications.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:27 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/uAVtDAbHy3</title>
    <link>https://link.medium.com/uAVtDAbHy3</link>
    <guid isPermaLink="true">https://link.medium.com/uAVtDAbHy3</guid>
    <description>I&#x27;m sorry, but I am unable to access external content such as the Medium link provided. If you can provide me with the main points or key ideas from the content, I would be happy to help summarize it for you.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:25 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/99Jx3wwTv3</title>
    <link>https://link.medium.com/99Jx3wwTv3</link>
    <guid isPermaLink="true">https://link.medium.com/99Jx3wwTv3</guid>
    <description>I&#x27;m unable to access external content such as the one you provided. If you can provide a brief overview or key points from the content, I&#x27;d be happy to help summarize it for you in 100 words or less.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:23 +0000</pubDate>
  </item>
  <item>
    <title>Inf0rM@tion Disclosure via IDOR - Pratyush Anjan Sarangi - Medium</title>
    <link>https://medium.com/@pratyush1337/inf0rm-tion-disclosure-via-idor-cff5541a9232</link>
    <guid isPermaLink="true">https://medium.com/@pratyush1337/inf0rm-tion-disclosure-via-idor-cff5541a9232</guid>
    <description>The content is titled &quot;Inf0rM@tion Disclosure via IDOR&quot; by Pratyush Anjan Sarangi on Medium. It likely discusses Information Disclosure through Insecure Direct Object References (IDOR) in web applications. This vulnerability allows unauthorized access to sensitive data by manipulating object references. The article may delve into the impact of IDOR on security and ways to prevent such disclosures.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:21 +0000</pubDate>
  </item>
  <item>
    <title>cat ~/footstep.ninja/blog.txt</title>
    <link>https://footstep.ninja/posts/idor-via-http/</link>
    <guid isPermaLink="true">https://footstep.ninja/posts/idor-via-http/</guid>
    <description>The command &quot;cat ~/footstep.ninja/blog.txt&quot; is used in a Unix-like operating system to display the contents of a specific file named &quot;blog.txt&quot; located in the directory &quot;~/footstep.ninja&quot;. The &quot;cat&quot; command is commonly used to concatenate and display the contents of files. By running this command, the text within the &quot;blog.txt&quot; file will be displayed in the terminal window.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:19 +0000</pubDate>
  </item>
  <item>
    <title>cat ~/footstep.ninja/blog.txt</title>
    <link>https://footstep.ninja/posts/exploiting-self-xss/</link>
    <guid isPermaLink="true">https://footstep.ninja/posts/exploiting-self-xss/</guid>
    <description>The command &quot;cat ~/footstep.ninja/blog.txt&quot; is used in a Unix-like operating system to display the contents of a text file named &quot;blog.txt&quot; located in the &quot;footstep.ninja&quot; directory. The &quot;cat&quot; command is commonly used to concatenate and display the contents of files. By running this command, the text within the &quot;blog.txt&quot; file would be displayed in the terminal window.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:17 +0000</pubDate>
  </item>
  <item>
    <title>Airbnb : Steal Earning of Airbnb hosts by Adding Bank Account/Payment Metho</title>
    <link>https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html</link>
    <guid isPermaLink="true">https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html</guid>
    <description>The content suggests a concern that Airbnb may be involved in stealing earnings from hosts by adding unauthorized bank accounts or payment methods. This raises issues of potential fraud or unauthorized access to hosts&#x27; funds. It highlights a possible risk for Airbnb hosts who rely on the platform for income.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:16 +0000</pubDate>
  </item>
  <item>
    <title>HTTP Request Smuggling IDOR - Hipotermia</title>
    <link>https://hipotermia.pw/bb/http-desync-idor</link>
    <guid isPermaLink="true">https://hipotermia.pw/bb/http-desync-idor</guid>
    <description>The content appears to be about a potential security vulnerability known as HTTP Request Smuggling IDOR (Insecure Direct Object Reference) with the code name &quot;Hipotermia.&quot; This vulnerability could allow attackers to manipulate HTTP requests to access unauthorized resources or perform malicious actions. It is essential for web developers and security professionals to be aware of such vulnerabilities to prevent exploitation and protect sensitive data.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:11 +0000</pubDate>
  </item>
  <item>
    <title>cat ~/footstep.ninja/blog.txt</title>
    <link>https://footstep.ninja/posts/idor-via-websockets/</link>
    <guid isPermaLink="true">https://footstep.ninja/posts/idor-via-websockets/</guid>
    <description>The command &quot;cat ~/footstep.ninja/blog.txt&quot; is used in a Unix-like operating system to display the contents of a text file named &quot;blog.txt&quot; located in the &quot;footstep.ninja&quot; directory. The &quot;cat&quot; command is commonly used to concatenate and display the contents of files. By running this command, the text within the specified file will be printed in the terminal window.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:10 +0000</pubDate>
  </item>
  <item>
    <title>Stories Of IDOR-Part 2 - InfoSec Write-ups - Medium</title>
    <link>https://medium.com/bugbountywriteup/stories-of-idor-part-2-29d313a39e55</link>
    <guid isPermaLink="true">https://medium.com/bugbountywriteup/stories-of-idor-part-2-29d313a39e55</guid>
    <description>The content seems to be a continuation of a series called &quot;Stories Of IDOR&quot; focusing on cybersecurity write-ups. It is likely published on the Medium platform. The content may delve into stories related to Insecure Direct Object References (IDOR) in the realm of information security. This series could provide insights, analysis, and possibly solutions related to IDOR vulnerabilities.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:07 +0000</pubDate>
  </item>
  <item>
    <title>How I could delete Facebook Ask for Recommendations post’s place objects in</title>
    <link>https://medium.com/@rajasudhakar/how-i-could-delete-facebook-ask-for-recommendations-posts-place-objects-in-comments-b7c9bcdf1c92</link>
    <guid isPermaLink="true">https://medium.com/@rajasudhakar/how-i-could-delete-facebook-ask-for-recommendations-posts-place-objects-in-comments-b7c9bcdf1c92</guid>
    <description>The content discusses how to delete the location tags associated with Facebook Ask for Recommendations posts. It focuses on removing the specific place objects that are linked to these posts.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:05 +0000</pubDate>
  </item>
  <item>
    <title>Chains on Chains!! Chaining several IDOR’s into Account Takeover(PART ONE)</title>
    <link>https://medium.com/@masonhck357/chains-on-chains-chaining-several-idors-into-account-takeover-part-one-373627f2910f</link>
    <guid isPermaLink="true">https://medium.com/@masonhck357/chains-on-chains-chaining-several-idors-into-account-takeover-part-one-373627f2910f</guid>
    <description>The content appears to discuss chaining multiple Insecure Direct Object References (IDORs) to execute an Account Takeover attack. This process involves exploiting vulnerabilities in the way user permissions are handled to gain unauthorized access to user accounts. The title suggests that this is part one of a series of articles or guides on this topic.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:03 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/ReIPZNYhm0</title>
    <link>https://link.medium.com/ReIPZNYhm0</link>
    <guid isPermaLink="true">https://link.medium.com/ReIPZNYhm0</guid>
    <description>I&#x27;m unable to access external content. If you provide me with the key points or main ideas from the content, I can certainly help summarize it for you in 100 words or less.</description>
    <category>IDOR</category>
    <pubDate>Thu, 14 Aug 2025 04:01:01 +0000</pubDate>
  </item>
  <item>
    <title>IDOR - how to predict an identifier? Bug bounty case study</title>
    <link>https://www.youtube.com/watch?v=wx5TwS0Dres</link>
    <guid isPermaLink="true">https://www.youtube.com/watch?v=wx5TwS0Dres</guid>
    <description>The content discusses IDOR (Insecure Direct Object Reference) vulnerability in bug bounty programs, focusing on predicting identifiers to exploit this flaw. The video likely provides a case study demonstrating how this vulnerability can be leveraged for unauthorized access. It is essential for security professionals and bug bounty hunters to understand and address IDOR vulnerabilities to protect systems and data.</description>
    <category>IDOR</category>
    <pubDate>Fri, 22 Sep 2023 16:17:58 +0000</pubDate>
  </item>
</channel>
</rss>