lemmyreader@lemmy.ml to linuxmemes@lemmy.worldEnglish · 8 months agoBackdoorslemmy.mlimagemessage-square115fedilinkarrow-up11.62Karrow-down138file-textcross-posted to: autism@lemmy.world
arrow-up11.58Karrow-down1imageBackdoorslemmy.mllemmyreader@lemmy.ml to linuxmemes@lemmy.worldEnglish · 8 months agomessage-square115fedilinkfile-textcross-posted to: autism@lemmy.world
minus-squareSpaceMan9000@lemmy.worldlinkfedilinkarrow-up44arrow-down1·8 months agoHonestly, for closed source software the POCs are also immediately available. Lots of threat actors just use patch diffing. These days vulnerabilities are at times also patched with other non-related commits to conceal what exactly has changed.
Honestly, for closed source software the POCs are also immediately available. Lots of threat actors just use patch diffing.
These days vulnerabilities are at times also patched with other non-related commits to conceal what exactly has changed.