FOLLOW FLUID ATTACKS
The system’s authorization mechanism does not prevent one user from accessing
another user’s data by modifying the key value that identifies it.
R176. Restrict system objects
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.