Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.
No PoCs from references.
- https://github.com/ndouglas-cloudsmith/exploit-check