Which vulnerability allows attackers to access resources they shouldn’t due to weak enforcement of user permissions?
Injection
Broken Access Control
Cryptographic Failures
Server-Side Request Forgery
This question is part of this quiz :
OWASP Top 10 Vulnerabilities