A authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface.

Filter

Select a date

Search by vendor

Select a date

Search by vendor

Filter