Numen Cyber said exploiting the vulnerability does not require novel techniques
This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/Read the original article:
Share this:
Support the originator by clicking the read the rest link below.