Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Privilege Escalation Leads to making authenticated actions (payment processing, creating invoices.. etc) |
Page 1 of 1
Title | Vulnerabilities | Programs | Authors |
---|---|---|---|
Privilege Escalation Leads to making authenticated actions (payment processing, creating invoices.. etc) |