Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Incorrect Default Permissions

The software, upon installation, sets incorrect permissions for an object that exposes it to an unintended actor. The weakness is introduced during Architecture and Design, Implementation, Installation, Operation stages.