FOLLOW FLUID ATTACKS
It is possible to inject XPath queries into the application. This may be used to read sensitive data without authorization.
R173. Discard unsafe inputs
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.