Patrick Byrne @PatrickByrne
3“…which could be leveraged by an attacker to gain elevated privileges on a device and/or install malicious code.” 4“An attacker could leverage this vulnerability to escalate privileges on a device and/or install malicious code.” — PolitiTweet.org