Rated 9.8 out of 10 in severity, the flaw could allow a remote attacker to gain unauthorized access to applications.
How are *_sce.dat files created? While the code also documents how these files are structured, here it is also the same information on a more accessible manner. This engine has an interesting quirk: ...