Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This has been the way for a long time, exploiting XML tags was a means of exfiltrating data or reversing a model for a while as well. Some platforms are still vulnerable to this.
 help



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: