Brad Scalio

Authored Comments

How did user john gain authorization to run useradd or did user exploit a known vulnerability to escalate privileges?