Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Use of Cache Containing Sensitive Information

The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere.