Comment by tptacek

Comment by tptacek 8 months ago

0 replies

Point to a real, exploitable, public vulnerability that exploits this behavior, and then we'll all be talking about the same thing.