2024-11-22 22:18:12
icscert
PUBLISHED
The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource.