Results (
English) 2:
[Copy]Copied!
This is a vulnerability stems from the design of applications based on the wrong assumption that the user will always follow the rules that apply. For example, if a user account is displayed in the URL or a hidden field, a malicious user can guess the user's account and send a request for access to their data. The best way to prevent this vulnerability is to use random, unpredictable account and not to disclose his real name of the object
Being translated, please wait..
