The vulnerability allows attackers to create administrative user accounts, modify and delete data in the application database, and potentially gain full control of vulnerable systems.
This article has been indexed from Cyware News – Latest Cyber News