Results (
English) 3:
[Copy]Copied!
This is a source of vulnerability d a design application error, assuming the user always follow the rules. For example, if a user's account is displayed in a field of URL or a hidden malicious use, you can predict the user's account and send a request to access their data. The best way to stop this vulnerability is to use random, unpredictable accounts and not to disclose the names of the objects
Being translated, please wait..
