Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Cleartext Transmission of Sensitive Information

The weakness is introduced during Architecture and Design, Implementation, System Configuration stages.