Jun 18 · 1 min read
This does impact the “Confidentiality” of the system running the vulnerable software. Assume a scenario where an attacker is having initial foothold to the target system, the information harvested from any source (not just limited to this one) can be utilized to perform targeted attacks.