What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker would gain the rights of the user that is running the affected application. According to the CVSS metric, user interaction is required (UI:R) and privileges required are low (PR:L). What does that mean for this vulnerability? An authenticated attacker must wait for the victim user to launch the application for the vulnerability to be exploited.
<a href="https://twitter.com/filip_dragovic">Filip Dragović</a>