The flaw allows remote code execution via a public REST API, giving attackers a direct path to compromise enterprise ...
Over the years, the processes associated with protecting data became disjointed as vendors tried to monetize various add-on modules for a core backup and recovery application. Since then, vendors have ...