FOLLOW FLUID ATTACKS
It is possible to access confidential files without being authenticated or
without having the required permissions.
R096. Set user required privileges
R176. Restrict system objects
R264. Request authentication
R320. Avoid client-side control enforcement
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.