CWE-807 – Reliance on Untrusted Inputs in a Security Decision
Description The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an...
Description The application uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an...