So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?
mouse_•1h ago
So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?