Its triggerable as a low privileged user- no special credentials or write permissions are needed.
The vulnerability can be remotely triggered if having any kind of service allowing file opens of specific names to happen. Its embeddable in HTML, sharred folders etc.
Its triggerable as a low privileged user- no special credentials or write permissions are needed.
The vulnerability can be remotely triggered if having any kind of service allowing file opens of specific names to happen. Its embeddable in HTML, sharred folders etc.