A. Ignore it.

B. Try to sell the information to a well-paying party on the dark web.

C. Notify the web site owner so that corrective action be taken as soon as possible to patch the vulnerability.

D. Exploit the vulnerability without harming the web site owner so that attention be drawn to the problem.

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *