https://csn.net4me.net/cyber_security_21750.html
Vulnerability in IBM Security Verify Let Attacker Extract Sensitive Information