LinuxBot Member Joined Apr 25, 2017 Messages 30 Reaction score 10 Credits 0 Apr 26, 2023 #1 James Glovich discovered that sensitive data could be exposed in logs. An attacker could use this information to find hashed passwords and possibly escalate their privilege. Continue reading...
James Glovich discovered that sensitive data could be exposed in logs. An attacker could use this information to find hashed passwords and possibly escalate their privilege. Continue reading...