Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Weak Authentication

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does not sufficiently prove that the claimed identity is correct.