2023-12-19 23:40:49
icscert
PUBLISHED
An attacker with network access could perform a man-in-the-middle (MitM) attack and capture sensitive information to gain unauthorized access to the application.