Answer:
Attackers typically exploit vertical privilege escalation vulnerabilities by gaining unauthorized higher-level access within an application.
Attackers typically exploit vertical privilege escalation vulnerabilities by gaining unauthorized higher-level access within an application.
You may be interested in:
Web Security MCQs