top | item 45945374 (no title) notpublic | 3 months ago What is the proper way to disclose evidence for this class of hacking? discuss order hn newest cosmosgenius|3 months ago Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.
cosmosgenius|3 months ago Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.
cosmosgenius|3 months ago