It is a bit eye rolling “LOOK AT THIS DISASTER OF AN EXPLOIT!!!” *Requires physical access to the machine
But the major issue is that if you have some other exploit that gets you RCE or a shell you can then use these exploits to pwn someone and we have RCE’s and shell exploits come around all the time.
It is a bit eye rolling “LOOK AT THIS DISASTER OF AN EXPLOIT!!!” *Requires physical access to the machine
But the major issue is that if you have some other exploit that gets you RCE or a shell you can then use these exploits to pwn someone and we have RCE’s and shell exploits come around all the time.