FOLLOW FLUID ATTACKS
It is possible to access confidential files without being authenticated or
without having the required permissions.
R096. Set user required privileges
R176. Restrict system objects
R264. Request authentication
R320. Avoid client-side control enforcement
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.