Confirmed users
717
edits
Line 18: | Line 18: | ||
*full-privilege extension could be remotely installed without user consent | *full-privilege extension could be remotely installed without user consent | ||
*overwrite application settings | *overwrite application settings | ||
*process could import an external library and call its functions | |||
*process could take advantage of race conditions to modify a system call / message between the time a security check is performed and the API is actually called | |||
==System / Local Network Data Theft== | ==System / Local Network Data Theft== |