2023-03-27 19:38:44
icscert
PUBLISHED
A malicious user could leverage this vulnerability to escalate privileges or perform unauthorized actions in the context of the targeted privileged users.