I asked how many times you saw this exploited in the wild, not "how would an attack theoretically work".
No comments yet.