Vulnerability
From observation to issue & exploitability judgment
๐ฑ This series follows vulnerability work in three aspects: ๐ญ Map the attack surface: what is exposed, trusted, and reachable before calling something a bug. ๐ญ Find and reason about issues: from observation to root cause, including when to stop without a PoC. ๐ญ PoC and exploitability: constrained proofs when appropriate; public notes here stay careful and sanitized.
I would like provide interesting findings about vulnerability research to the community.
Briefs
No briefs yet.
Analysis
No analysis posts yet.