FAQ What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would be able to delete any system files.