The correct answer to this question is D. When an application offers direct access to objects due to input provided by the user, this is called an Insecure Direct Object Reference. If a user's authorization is not validated, an attacker can access the system and directly access resources such as files, directories, or database records, making the system vulnerable to being hacked and important data stolen.
Unfortunately, according to the Open Web Application Security Project (OWASP), it is more commonplace than many people would think that an insecure direct object references vulnerability, making this vulnerability easy to exploit in many systems.