Submitter : c2a
Date: 4 September 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/
Submitter : c2a
Date: 4 September 2024
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://jfrog.com/blog/revival-hijack-pypi-hijack-technique-exploited-22k-packages-at-risk/