Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Intel believes these exploits do not have the potential to corrupt, modify or delete data.

No, but they do have the potential for privilege escalation or credential exfiltration, which in turn do grant the potential to corrupt, modify and delete data.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: