|
Content is hidden
|
Broken Access Control (BAC)
|
|
Content is hidden
|
Server-Side Request Forgery (SSRF)
|
|
Content is hidden
|
Unsafe Cross-Origin Resource Sharing
|
|
Content is hidden
|
Violation of Secure Design Principles
|
|
Content is hidden
|
Key Exchange without Entity Authentication
|
|
Content is hidden
|
Broken Access Control (BAC)
|
|
Content is hidden
|
SSO Authentication Bypass
|