2024-07-09 07:10:57
CERTVDE
PUBLISHED
A remote attacker with high privileges may use a deleting file function to inject OS commands.