[x] I have searched the existing issues and pull requests for duplicates.
Type of Issue
[ ] New vulnerability addition
[ ] Feature request
[x] Update existing vulnerability
Description
The Insufficient Access Control vulnerability doesn't have much content inside it. Though Access Control Vulnerability is pretty straightforward, I think it will be worth mentioning all the common access control mechanisms that are used and some best practices like role based access control, 2 step role transfer, etc
Checklist
Type of Issue
Description
The Insufficient Access Control vulnerability doesn't have much content inside it. Though Access Control Vulnerability is pretty straightforward, I think it will be worth mentioning all the common access control mechanisms that are used and some best practices like role based access control, 2 step role transfer, etc