Known Vulnerabilities in Folder-based Authorization Strategy 217.vd5b_18537403e