Use of the Logsurfer program when properly configured may leave the system vulnerable to a remote code execution vulnerability.
Use of the Logsurfer program when properly configured may leave the system vulnerable to a remote code execution vulnerability.