The vulnerability, if exploited, could allow an authenticated miscreant
(OS Standard User) to tamper with Process Optimization project files,
embed code, and escalate their privileges to the identity of a victim
user who subsequently interacts with the project files.
في طابور التحليل الذكي
سيتم تحليل هذا CVE تلقائياً في المهام المجدولة.