(no title)
czk | 1 month ago
their log viewer renders the markdown and their browser will make a request containing the sensitive data to the attackers domain where it can be logged and viewed
czk | 1 month ago
their log viewer renders the markdown and their browser will make a request containing the sensitive data to the attackers domain where it can be logged and viewed
No comments yet.