Get Demo
Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to sensitive information.
The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.