CSRF attacks exploit the authenticated sessions of users to perform unintended actions. By tricking authenticated users into executing malicious requests, attackers can, for example, initiate fund transfers, change account settings, or perform actions without the user's consent.
IDOR is a web vulnerability that happens when an application provides access to objects based on user input. Attackers use IDOR vulnerabilities to obtain unauthorized access to sensitive data or resources by changing object references. Unlike classic access control vulnerabilities, in which an attacker impersonates another user, IDOR attacks involve changing direct references to objects, such as files, database entries, or URLs, to circumvent authorization checks.
Cross-Site Scripting (XSS) is one of the most common web vulnerabilities where an attacker injects malicious scripts into trusted websites. These scripts execute in the victim's browser, allowing attackers to steal session cookies, redirect users, or manipulate page content. This vulnerability occurs when applications include untrusted data without proper validation or encoding.