Background#
Pre-requisites#
Risks#
How to check for#
How to exploit#
Recommendation#
Related Vulnerabilities#
This finding should not be reported as the name of this issue, instead it should be reported as the vulnerabilities written below. The below written vulnerabilities map to the vulnerability-descriptions in that repo.
For example, if kerberoast, report as the following vulnerabilities if they are applicable:
- Weak password [ID of issue]
- Overpriviliged kerberoastable user [ID of issue]