An attacker who efficiently exploited this vulnerability could get the identical person legal rights as the current person. If The present person is logged on with administrative user rights, an attacker who properly exploited this vulnerability could consider complete control of an influenced program.An information disclosure vulnerability exists … Read More