2025-04-15 20:21:34
icscert
PUBLISHED
An unauthenticated attacker can obtain a users plant list by knowing the username.