Total vulnerabilities in the database
An authenticated attacker could create an audit file that bypasses PowerShell cmdlet checks and executes commands with administrator privileges.
CVSS v3:
CVSS v2:
No CWE or OWASP classifications available.