A authenticated attacker with low privileges can extract password hash information for all users.

Filter

Select a date

Search by vendor

Select a date

Search by vendor

Filter