Yes this is what I really mean. The vulnerability would be part of the system. The business logic of the exploit would be elsewhere, using the vulnerability as a way in.
2 Likes
Yes this is what I really mean. The vulnerability would be part of the system. The business logic of the exploit would be elsewhere, using the vulnerability as a way in.