| http://www.w3.org/ns/prov#value | - It said secondary impacts include: the ability to make changes to the device configuration access to sensitive information including device and network information, credentials, and information passed to the printer ability to leverage further attacks through arbitrary code execution.
|