A authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface.
Filter
Materials
Back to top 
A authenticated attacker with low privileges can activate high privileged user and use it to expand attack surface.
Filter
Materials