alt
Hacker News
crote
•
today at 3:41 AM
•
0 replies
•
view on HN
That's only proof of the vulnerability. Where's the proof of it being misused by the vendor?