If exploited, an attacker could read through sensitive info, and create users. such as, a malicious person with standard privileges could complete significant capabilities for instance creating a user with elevated privileges and examining sensitive information while in the "sights" area. Wondering how this aids? perfectly, It is really great for