Submitter : c2a
Date: 26 October 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://checkmarx.com/blog/attacking-the-software-supply-chain-with-a-simple-rename/
Submitter : c2a
Date: 26 October 2022
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://checkmarx.com/blog/attacking-the-software-supply-chain-with-a-simple-rename/