Back

639

Source: cwe.mitre.org

Published:

<p>Retrieval of a user record occurs in the system based on some key value that is under user control. The key would typically identify a user-related record stored in the system and would be used to lookup that record for presentation to the user. It is likely that an attacker would have to be an a

Read original article

Loading article...

Article not found