Content deleted Content added
→See also: added foreshadow |
that does not apply to the general concept |
||
Line 22:
| quote = ''[sic]:'' The effects of these vulnerabilities are catastrophic: « at best, the vulnerability can be used by malwares and hackers to exploit other security linked bugs. At worse, the flaw can be used by softwares and authentified users to read the kernel’s memory
| accessdate = February 4, 2019
}} </ref>
== See also ==
|