Get a Demo
Partner login
Product
SAST
Catch vulnerabilities as you develop
DAST
Test live web applications like an attacker
SCA
Secure open-source and supply chain
MAST
Secure mobile apps from code to store
Compliance
Align with standards while shipping secure code
Resources
Vulnerability database
Healthy Package
Blog
News
Pricing
Partners
About Us
Log In
SAST
DAST
SCA
MAST
Compliance
Pricing
Partners
Vulnerability database
Healthy Package
Blog
News
About Us
Log In
Vulnerability database
Config files : Receiver without permissions
Search
Config files : Receiver without permissions
DerScanner Severity Score
Do you want to fix Config files : Receiver without permissions in your application?
Try DerScanner
See also
Config files : Unsafe SQL in DFM file
Config files : Undocumented feature: changing the visual display of the code
Config files : Log4j Vulnerability