2023-11-14 23:18:08
hackerone
PUBLISHED
When a particular process flow is initiated, an attacker may be able to gain unauthorized elevated privileges on the affected system when having control over a specific file.