The vulnerability, if exploited, could allow an authenticated miscreant
(Process Optimization Designer User) to embed OLE objects into graphics,
and escalate their privileges to the identity of a victim user who
subsequently interacts with the graphical elements.
في طابور التحليل الذكي
سيتم تحليل هذا CVE تلقائياً في المهام المجدولة.