Vigil@nce - shadow: read-write access via TOCTOU, analyzed on 28/11/2022
January 2023 by Vigil@nce
An attacker can bypass access restrictions of shadow, via TOCTOU, in order to read or alter data.
Plus d'information sur : https://vigilance.fr/vulnerability/shadow-read-write-access-via-TOCTOU-39966