Understanding JWT Vulnerabilities: The 'None' Vulnerability