Problem
Research threat and vulnerabilities as it relates to system and data protection. Then, research real examples of vulnerabilities being exploited. Select an example and summarize the vulnerability, the exploit, and provide the actions required to correct the vulnerability.