More Sources
Tools & Data
The affected product is vulnerable to an improper access control, which may allow an authenticated user to gain unauthorized access to sensitive data.