Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Authentication Bypass by Primary Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.