An attacker exploits the logic validation mechanisms of an e-commerce website. He successfully purchases a product worth $100 for $10 by modifying the URL exchanged between the client and the server.
Identify the attack depicted in the above scenario.

Truman
4 months agoSelma
4 months agoDarnell
4 months agoLaticia
4 months agoPhuong
4 months agoGenevieve
5 months agoJacquelyne
5 months agoGail
5 months agoAlesia
5 months agoAleta
5 months agoKanisha
5 months ago