An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Learn how to set up a dual monitor system, extend your screen, and optimize computer display settings for enhanced ...