Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes for sure. An RCE in the first is sufficient, or an auth bypass in the first and some other vulnerability in the second.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: