Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



External Control of Critical State Data

The software stores security-critical state information about its users, or the software itself, in a location that is accessible to unauthorized actors.