Password reset broken logic………….. ………………………………..1
2FA broken logic ………………….3
Excessive trust in client-side controls ……………………………… 6
High-level logic vulnerability .. 8
Inconsistent security controls …………………………………………10
Flawed enforcement of business rules …………………………… 13
Low-level logic flaw …………… 16
Inconsistent handling of exceptional input ………………………18
Weak isolation on dual-use endpoint ……………………………… 21
Insufficient workflow validation ……………………………………… 23
Authentication bypass via flawed state machine …………….. 26
Infinite money logic flaw ……. 29
Authentication bypass via encryption oracle ………………….. 31
Reference …………………………. 34
نظرات کاربران