Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



.NET Misconfiguration: Use of Impersonation

Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file systems can be dangerous and result in various forms of attacks.