Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Improper Restriction of Names for Files and Other Resources

The product constructs the name of a file or other resource using input from an upstream component, but it does not restrict or incorrectly restricts the resulting name.