The application triggers logging events exclusively from the front-end. This could be used by an attacker to disrupt the traceability of their actions by dropping the logging requests.
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.