A man in the middle can redirect traffic to a malicious server in a compromised configuration.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Synchronization_engine | Pega | 3.1.1 (including) | 3.1.30 (excluding) |