top | item 46054245 (no title) pkaeding | 3 months ago Yes, and get requests with the sensitive data as query parameters are often used to exfiltrate data. The attackers doesn't even need to set up a special handler, as long as they can read the access logs. discuss order hn newest No comments yet.
No comments yet.