When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Should a threat actor abuse these flaws, theyd be able to run arbitrary code execution on vulnerableendpoints.
Otherwise, they will need to trigger the patch manually.
ViaBleepingComputer