Aayush-C
This vulnerability allows an attacker to impersonate another user or a high-privilege user like an admin. We learned how to perform basic privilege escalation and how to protect against it.
74756950 Bytes