An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Every time Jennifer publishes a story, you’ll get an alert straight to your inbox! Enter your email By clicking “Sign up”, you agree to receive emails from ...