NShiftKey-Rule-Guide logo NShiftKey-Rule-Guide

1. Vulnerability Description

[Figure 1] Example of parameter tampering

2. How to check vulnerability

3. Vulnerability Countermeasure

4-1. Sample Code (JAVA)