An attacker who exploits this flaw could use system privileges to install programs, view or delete data, and create accounts with full user rights.

By admin