An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
When opening or browsing PDF files on your desktop or through File Explorer, you may suddenly notice that the icons turn into ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results