The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.
This article has been indexed from Security | TechRepublic
The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.