Access-related Vulnerabilities
Vulnerabilities that exploit AuthZN or access controls.
PreviousCross-Origin Resource Sharing (CORS) MisconfigurationNextInsecure Direct Object References (IDOR)
Last updated
Vulnerabilities that exploit AuthZN or access controls.
Last updated