Submitter : c2a
Date: 17 March 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://www.zerodayinitiative.com/blog/2022/3/16/abusing-arbitrary-file-deletes-to-escalate-privilege-and-other-great-tricks