The toy’s platform contained an improper authentication handling vulnerability that could allow an unauthorized user to obtain a child’s name, age, … from children toys http://ift.tt/1Pzg9Hp via children toys
Комментариев нет:
Отправить комментарий