Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability.
Input verification vulnerability in the power module. Impact: Successful exploitation of this vulnerability will affect availability.