(no title)
cygx | 2 years ago
For example, if you corrupt a program that's allowed to use web sockets, you'll be able to port scan the user's local network.
cygx | 2 years ago
For example, if you corrupt a program that's allowed to use web sockets, you'll be able to port scan the user's local network.
flohofwoe|2 years ago
cygx|2 years ago