Vulnerabilities could allow attackers to gain unauthorized access to company resources or carry out denial-of-service attacks
This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/
Read the original article: