Comment by consp

2 years ago

Maybe make a cve out of it since it is an obvious exploit path running unchecked automatically downloaded binaries without user interference.

I don't know if this is sarcastic but doesn't a CVE require an actual proof of attack and not just hypothetical?

  • It was sarcastic but on point, and many cves do not have poc exploits so at best it is murky.