Implementation of Malware scanning on all uploaded files on attachments


A malicious actor can store and distribute malicious files on D365. Also, an attacker might be able to upload malicious executables or malicious documents and execute commands in the victim user's browser, including operations in the application on behalf of the victim user or exfiltrating sen...

Read more...
1 Comments

Read more...
1 Comments

Category: General (472)

STATUS DETAILS
New