We are not aware of malware exploiting this vulnerability. Is there known malware, which exploits this vulnerability? The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability. How the attacker can exploit this vulnerability? This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |