2025-04-15 21:55:20
icscert
PUBLISHED
Unauthenticated attackers can rename "rooms" of arbitrary users.