

4·
9 days agoAre there any infos about what an attacker can do with this? The article didn’t say this. Remote Code execution? With the privileges of the app? Reading all files? Or only some? The impact information seems important here.


Are there any infos about what an attacker can do with this? The article didn’t say this. Remote Code execution? With the privileges of the app? Reading all files? Or only some? The impact information seems important here.
Omg, I simply cannot! Thanks for brightening my day with this paper XD