| ▲ | fc417fc802 2 hours ago | |||||||
Even if the intent is clear I don't think the act of reading an available field qualifies as exploiting a vulnerability. IMO you need to actually work around a technical measure intended to stop you for it to qualify as an exploit. | ||||||||
| ▲ | NotPractical an hour ago | parent [-] | |||||||
Here's the technical measures that are being worked around: https://blog.mozilla.org/en/firefox/fingerprinting-protectio... > IMO you need to actually work around a technical measure intended to stop you for it to qualify as an exploit. Even well-known vulnerabilities like SQL injection don't qualify under this definition? | ||||||||
| ||||||||