📄️ Authenticated route bypass
Description
📄️ Broken Object Level Authorization
Description
📄️ Forced Browsing
Description
📄️ Private data
Description
📄️ Private fields
Description
📄️ Public state-altering operation
Description
📄️ Sensitive endpoint bruteforce
Description
📄️ Tenant isolation
Description