Broken Access Control
Select > > > > > .
Some enterprises fail to enforce access controls that restrict what authenticated users are allowed to do. By exploiting vulnerabilities in access controls, a malicious user might retrieve sensitive files, gain access other user’s accounts, change access rights, and misuse data.
|
Dashboards |
Reports |
|
n/a |