Two critical flaws allow users to gain access to root privileges.
You must be logged in to post a comment.