Implementation of Malware scanning on all uploaded files on attachments
A malicious actor can store and distribute malicious files on D365. Also, an attacker might be able to upload malicious executables or malicious documents and execute commands in the victim user's browser, including operations in the application on behalf of the victim user or exfiltrating sen...
STATUS DETAILS
New