Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is discussed in the post – many came down to individual programs' policies e.g. not accepting the vulnerability if it was in a 3rd party product they used (but still hosted by them), duplicates (another researcher reported the same vuln at the same time; not really any way to avoid this), or not accepting some classes of vuln like cache poisoning.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: