Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications.
Entering text into the input field will update the search result below Entering text into the input field will update the search result below ...