2025-04-15 20:59:44
icscert
PUBLISHED
An attacker can change registered email addresses of other users and take over arbitrary accounts.