An attacker could exploit this vulnerability by sending malicious requests to the FTP servers.
FTP service commands are used for authentication, file transfer, and file system functions.
Collection
[
|
...
]
An attacker could exploit this vulnerability by sending malicious requests to the FTP servers.
FTP service commands are used for authentication, file transfer, and file system functions.