How did user john gain authorization to run useradd or did user exploit a known vulnerability to escalate privileges?
Authored Comments
How did user john gain authorization to run useradd or did user exploit a known vulnerability to escalate privileges?