Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Missing Support for Integrity Check

The software uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum.