Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.
Read full article on Dark Reading
Vulnerability allows attackers to run arbitrary commands, including the ability to delete, modify, and exfiltrate private source code.
Read full article on Dark Reading