Inadequate lock protection within Xilinx Run time may allow a local attacker to trigger a Use-After-Free condition potentially resulting in loss of confidentiality or availability
Exploitability
AV:LAC:LPR:LUI:RScope
S:CImpact
C:HI:LA:L7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:LOther