Broken Access Control
Select > > > > > .
Some enterprises fail to enforce access controls that restrict what authenticated users are allowed to do. By exploiting vulnerabilities in access controls, a malicious user might retrieve sensitive files, gain access other user’s accounts, change access rights, and misuse data.
The Broken Access Control report lists vulnerable hosts by severity over time.