![]() Thankfully, we believe we addressed the issue before it was exploited by any malicious parties.” In a statement, Grindr’s chief operating officer Rick Marini told TechCrunch: “We are grateful for the researcher who identified a vulnerability. ![]() With a leaked password reset token, an attacker could reset a user’s password, hijack their account and access their private data.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |