The main description of your finding goes here! Please try to provide the following details, you don't have actually to list questions and answers but include the content within your paragraphs:
- How this kind of vulnerability works at a high level?
- What is incorrect in the code?
- Where is it located? add the relative path to the file and the line number/s
- What could an attacker achieve by successfully exploiting this issue? Who's affected?
- What does an attacker have to do to exploit the issue?
Your recommendation to fix the issue goes here. It should solve the described finding and not introduce any new vulnerability. Try to be specific about what you would change; you are free to add code here as long as you indicate the file and lines.
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here
The bug occurs in ...
The fix should be ...
// code goes here