An attacker could create a flow for a SharePoint action, and share it with the victim, which would end up leaking their SharePoint JWT access token. The crooks could then use this token to impersonate ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results