The first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.
The first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.