Most of what you do online is quietly logged, analyzed, and resold, even when it feels routine, like checking email or ...
Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications.