
Sign up to save your podcasts
Or


The application uses a serialisation-based session mechanism and is vulnerable to authentication bypass as a result.
By The application uses a serialisation-based session mechanism and is vulnerable to authentication bypass as a result.