top | item 46054245

(no title)

pkaeding | 3 months ago

Yes, and get requests with the sensitive data as query parameters are often used to exfiltrate data. The attackers doesn't even need to set up a special handler, as long as they can read the access logs.

discuss

order

No comments yet.