Technology ❯ Software Development ❯ Version Control ❯ Vulnerabilities
The company has not said how many users were affected or which hashing method was used.