The software performs an authorization check when an actor
attempts to access a resource or perform an action, but it does not correctly
perform the check. This allows attackers to bypass intended access
restrictions.
Paid content will be excluded from the download. |
Filter |
|
Matches : 909 | Download | Alert* |
© SecPod Technologies