ethical-hacker video for during testing, you discovered a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such
During testing, you discovered a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as viewing, updating and deleting sensitive data. Which of the following API vulnerabilities have you found?