The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objects, which can cause them to have less restrictive permissions than intended.
Explore 493 software weaknesses
Search 294,000+ vulnerabilities
Learn from real-world examples
Cybersecurity research & tools
Get in touch for collaboration
Explore more security resources