879 critical IT vulnerability identified
Facts About IT Vulnerability Revealed An unauthenticated remote attacker can send out a specifically crafted URI to accomplish an arbitrary file looking at vulnerability. A memory intake situation was resolved with improved memory handling. An software may be able to execute arbitrary code with kernel privileges. A successful exploit could enable the attacker to look …