Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources. – Read More
Attackers could have exploited the vulnerability to escalate privileges, violate user privacy while browsing, and access sensitive resources. – Read More