Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information, gain elevated ...