Authorization Bypass Options
Insecure Direct Object Reference (IDOR / BOLA)
Role/Permission Check Missing
Client-Side Controlled Roles
Insecure JWT / Token Validation
Path-Based Access Control
Method Tampering
Parameter Pollution
Race Conditions in Access Control
Cross Site Scripting
SQL Injection
Path Traversal / Arbitrary File Read
XXE
Type Juggling
Insecure Defaults
Unsecure Random Function
Last updated