Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

So has anyone every used that as an attack vector? Some proof-of-concept code is not hard to write.


yes - see https://attack.mitre.org/techniques/T1115/ for a non-exhaustive list




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: