This is one of the vulnerability which features in OWASP top 10 vulnerabilities. This vulnerability lies in the Access Control system which is responsible to control all the user’s activity. This vulnerability occurs when a non-privileged user is able to get logged in to the account of a privileged user without any authentication.