We recommend the following actions be taken: Successful exploitation of the vulnerability could result in the extraction of plaintext passwords, addition of an administrator account, execution of malicious code, or replacement of iLO firmware. Execution of the vulnerability requires an attacker to cURL to the affected server, followed by 29 “A” characters.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |