3 points | by diggan 2 days ago
1 comments
> Argument injection
So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?
> Argument injection
So the attacker needs write/execute on the machine before the attack can take place? Doesn't seem very serious to me. Maybe I'm misunderstanding this and someone can explain what a realistic exploit chain for this would look like?