#broken-authentication
Read more stories on Hashnode
Articles with this tag
Methods and Strategies to Break Authorization ยท IDOR - Background Info In our first example, what's stopping someone from checking another user's ID...