Due to poorly protected file permissions and lack of application authorization checks, attackers are able to read privileged local files on a system containing sensitive information.
Due to poorly protected file permissions and lack of application authorization checks, attackers are able to read privileged local files on a system containing sensitive information.
3.144.77.71