A second vulnerability could be used to prevent access to almost all of a site’s existing content, by simply redirecting visitors. Via Vulnerabilities – Threatpost https://threatpost.com