Insecure Direct Object Reference: IDOR Vulnerabilities Explained