The system does not properly verify the origin or authenticity of the data it
receives, thus it accepts invalid data.
R122. Validate email ownership
R173. Discard unsafe inputs
R178. Use digital signatures
R320. Avoid client-side control enforcement
Ready to start with Fluid Attacks?
Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.