So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?
reply
So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?
reply