Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Maybe make a cve out of it since it is an obvious exploit path running unchecked automatically downloaded binaries without user interference.


I don't know if this is sarcastic but doesn't a CVE require an actual proof of attack and not just hypothetical?


It was sarcastic but on point, and many cves do not have poc exploits so at best it is murky.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: