Researchers created a proof-of-concept attack that allows remote attackers to access protected APIs to extract credentials.
Comments are closed here.
Comments are closed here.