Quote:
Originally Posted by CYF
So this isn't a serious vulnerability? How do you figure?
|
There is a huge difference between "vulnerability" and actual cases of hacking. Every piece of software is "vulnerable".
Most likely you have to get social hacked into giving up some piece of information and then be on a certain domain at a certain time located at x,y gps coordinates and standing on your head sipping a glass of red wine while flatulating to actually exploit shit.