Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Data Access Operations Outside of Expected Data Manager Component

The product uses a dedicated, central data manager component as required by design, but it contains code that performs data-access operations that do not use this data manager.