Product
An authenticated remote attacker can exploit vulnerabilities in Devolutions Server to gain administrator rights, bypass security measures, manipulate data, or disclose sensitive information.