Forced browsing

Threat Description
blah blah blah

Attack Scenario
blah blah blah

Likelihood Considerations
blah blah blah

Impact Considerations
blah blah blah

Overall Severity
blah blah blah

Countermeasures
blah blah blah

Related Threats
blah blah blah