An attacker could escalate privileges on the server, further penetrating the network, harvesting customer information or mounting credible social-engineering campaigns.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here