
## Review A dedicated reviewer checked the rule description successfully for: - [ ] logical errors and incorrect information - [ ] information gaps and missing content - [ ] text style and tone - [ ] PR summary and labels follow [the guidelines](https://github.com/SonarSource/rspec/#to-modify-an-existing-rule) --------- Co-authored-by: daniel-teuchert-sonarsource <141642369+daniel-teuchert-sonarsource@users.noreply.github.com>
13 lines
531 B
Plaintext
13 lines
531 B
Plaintext
==== Malware distribution
|
|
|
|
Due to this vulnerability, malware can be stored and spread, both to users of
|
|
the service and to other potential targets. +
|
|
A malware depends on the attacker's intentions, as the following examples show:
|
|
|
|
* Cryptojacking malware, whose goal is to "mine" cryptocurrencies on the affected computers or servers.
|
|
* Spyware that spies out sensitive information from victims.
|
|
|
|
In the worst case, malware can cause the target systems to be completely
|
|
compromised and allow attackers to infiltrate the systems.
|
|
|