2024-01-10 13:01:35
bosch
PUBLISHED
The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.