Business Logic 11
- Authentication bypass via encryption oracle
- Infinite money logic flaw
- Authentication bypass via flawed state machine
- Insufficient workflow validation
- Weak isolation on dual-use endpoint
- Inconsistent handling of exceptional input
- Low-level logic flaw
- Flawed enforcement of business rules
- Inconsistent security controls
- High-level logic vulnerability
- Excessive trust in client-side controls