Figure-1.-Attacker-Controlled-Directory-Object