CVE-2024-45369
22.11.2024, 23:15
The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource.Enginsight
Common Weakness Enumeration
The web application uses a weak authentication mechanism to verify that a request is coming from an authenticated and authorized resource.Enginsight