Vandalism, in my language, can be used for "security problems" where the attacker destroys simply for the pleasure of destroying.
I believe we should centralize it in a "product" in the CVE Details, and add the security risk details for the protocols.
in
https://www.cvedetails.com/
Login to reply
Replies (1)
Ok, but what is actually happening? Who is doing what? It's I usually an issue in the specific client or relay and not on the protocol. But I have no idea what you mean by vandalism