Discover the top HR platforms for growing businesses that can help you scale your people management effectively.
An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.