A remote attacker with high privileges may use a deleting...
High severity
Unreviewed
Published
Jul 9, 2024
to the GitHub Advisory Database
•
Updated Jul 9, 2024
Description
Published by the National Vulnerability Database
Jul 9, 2024
Published to the GitHub Advisory Database
Jul 9, 2024
Last updated
Jul 9, 2024
A remote attacker with high privileges may use a deleting file function to inject OS commands.
References