Possible Vulnerabilities
Submitted by Daryle on Fri, 03/23/2012 - 11:43
The following vulnerabilities illustrate the need for a Message Authentication Code (MAC) to be part of the transaction processing system. Both vulnerabilities assume that there is no MAC included in the transaction. As such, they are similar to some of the competitive offerings already in the marketplace.