| Summary | Incorrect Authorization vulnerabilities in Trust Protection Foundation allow attackers to bypass access controls and perform unauthorized actions on restricted resources. |
|---|---|
| Publication Date | May 14, 2026, 4:16 a.m. |
| Registration Date | May 15, 2026, 4:22 a.m. |
| Last Update | May 15, 2026, 1:21 a.m. |