Successful exploitation could allow attackers to steal data, install malware, or take full control over affected big data ...