Memcached vulnerability can be used to steal or modify data from the Memcached servers