2024-06-13 17:26:46
icscert
PUBLISHED
Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.