High. The vulnerability is difficult to exploit; however, it is possible for an expert in Information Technology. Exploitation could result in elevated privileges.
Appears in 2 contracts
Sources: It Contract Terms, Master Services Agreement
High. The vulnerability is difficult to exploit; however, it is possible for an expert in Information Technology. Exploitation could result in elevated privileges.
Appears in 2 contracts
Sources: It Contract Terms, Master Services Agreement