An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
You can share a keyboard and mouse across multiple Windows and macOS computers, if you know the right tools to use.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results