Vulnerabilities in Mendix Encryption