Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.