If exploited, an attacker could browse sensitive info, and create customers. For example, a malicious consumer with standard privileges could accomplish important functions like creating a user with elevated privileges https://inesbbte245013.blognody.com/profile