Answer:
Attackers typically exploit horizontal privilege escalation vulnerabilities by gaining unauthorized access to higher-level resources within an application.
Attackers typically exploit horizontal privilege escalation vulnerabilities by gaining unauthorized access to higher-level resources within an application.
You may be interested in:
Web Security MCQs