This is a dedicated watch page for a single video.
Richard, an Internet user, accessed a web application of a healthcare institution through his registered account. As security controls were not properly implemented during the development of that web application, Richard’s credentials were compromised during an active session with the application. Identify the application security flaw exploited in the above scenario.