Which vulnerability allows attackers to access resources they shouldn’t due to weak enforcement of user permissions?

Last Updated :
Discuss
Comments

Which vulnerability allows attackers to access resources they shouldn’t due to weak enforcement of user permissions?

Injection

Broken Access Control

Cryptographic Failures

Server-Side Request Forgery

Share your thoughts in the comments