An unauthenticated attacker may be able to exploit this issue to access sensitive information, including the password files and system logs, which could be leveraged to launch subsequent attacks.

**Hidden Content: To see this hidden content your post count must be 1 or greater.**