Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Insufficient Logging

The weakness involves a case where the software either does not record the event or omits important details about the event when logging it, allowing an attackers to hide their presence on the system or malicious activity.