Hacker News new | past | comments | ask | show | jobs | submit login

That's actually supported by the CVE program rules. Have at it if you find examples with security vulns.



Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: