The product manages resources or behaves in a way that indirectly creates a new, distinct resource that can be used by attackers in violation of the intended policy.
Cookie Settings
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.