File Hijacking Vulnerability: The Elephant in the Room