Information exposure from the logging technique in Yugabyte Platform allows area attackers with usage of software logs to acquire database user qualifications in log documents, likely leading to unauthorized database https://tamzinnpsk170099.wikipublicity.com/user