Access control vulnerabilities
Types of access controls
Vertical
Horizontal
Context-dependent
Vulnerabilities
Vertical privilege escalation
Unprotected functionality
Parameter-based access control methods
Platform misconfiguration
Horizontal privilege escalation
Insecure direct object references (IDOR)
Last updated