An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Delete temporary files: This clears up system resources and removes any lingering malware. Open Settings, then go to Storage > Temporary files. Select the files you want to delete, and then select ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results