An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Identify the attack depicted in the above scenario.

Truman
5 months agoSelma
5 months agoDarnell
6 months agoLaticia
6 months agoPhuong
6 months agoGenevieve
6 months agoJacquelyne
6 months agoGail
6 months agoAlesia
6 months agoAleta
6 months agoKanisha
6 months ago