Exploiting the vulnerability can lead to denial-of-service (DoS) attacks.

Leave a Reply