Use conventional means to uninstall password-protected applications.
-
<p><strong>Reproduction steps:</strong></p>
<p><span></span>The specific reproduction process is presented in the form of video.</p>
<p>Unable to provide trace.</p>
<p><strong>Actual result:</strong></p>
<p><span>The program was successfully uninstalled.</span></p>
<p><strong>Expected Result:</strong></p>
<p><span>There is a verification mechanism and the program should not be uninstalled.</span></p> -
<p>If you use this method, it seems that it can affect not only the Beta version of the program, but the release version can also be successfully uninstalled by this method. I don’t know if this is a security vulnerability for you, because it seems that only a normal malware can get UAC authorization verification, then it can use this method to end the product, and the product has no corresponding measures in this process.</p>