top | item 45945374

(no title)

notpublic | 3 months ago

What is the proper way to disclose evidence for this class of hacking?

discuss

order

cosmosgenius|3 months ago

Starting with an isolated POC showing the vector being exploited would help. I like gooogle project zero mainly for this.