A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company's mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:
Which of the following is the most likely cause of the security control bypass?
krayxay
Highly Voted 1 year agogiancesarini2023
1 year agomouettespaghetti
Highly Voted 1 year agososa4547
Most Recent 4 days, 9 hours agoDacoder
8 months, 3 weeks agof6652ce
1 month, 1 week agoMehe323
1 week, 5 days agoLeonardSnart
11 months agoApplebeesWaiter1122
1 year agofouserd
1 year ago