FOLLOW FLUID ATTACKS
It is possible to inject XPath queries to the application.
This may be used to read sensitive data without authorization.
R173. Discard unsafe inputs
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.