Previous (Findings - Action based findings)
Attack generation vulnerability
Next (Findings - Action based findings)
Block list bypass vulnerability