The first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.

​The first patch lets threat actors with low-level credentials still exploit the vulnerability, while the second fully resolves the flaw.