Unprivileged attackers can get a root shell by exploiting an authentication bypass vulnerability in the polkit auth system service installed by default on many modern Linux distributions. The polkit ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results