An attacker who successfully exploited it would be able to take action with all the privileges of an affected SQL Server. At a minimum, this would grant the attacker complete control over the database, and potentially could grant administrative privileges at the operating system level as well.
Shop your favorite products and we’ll find the best deal with a single click. Designed to make shopping easier.