1. 10
  1.  

  2. 1

    If exploited, this vulnerability might permit code execution with the privileges of the authenticated user

    phew

    1. 2

      .. and may therefore allow bypassing restricted shell/command