The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.
The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.