Rated as high-risk vulnerabilities, these privilege-escalation flaws could allow an unauthenticated attacker to access protected content.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here