8.1 Broken Access Control

Select > Reports > Portal > Repository > Standard Content > OWASP > A 5 - Broken Access Control.

Some enterprises fail to enforce access controls that restrict what authenticated users are allowed to do. By exploiting vulnerabilities in access controls, a malicious user might retrieve sensitive files, gain access other user’s accounts, change access rights, and misuse data.

The Broken Access Control report lists vulnerable hosts by severity over time.