When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

“This would allow the attacker to jump in as arbitrary user within the vulnerable system.”

As such, it is a high-profile target for all sorts of cybercriminals.

ViaThe Hacker News

More from TechRadar Pro