Vandalism, in my language, can be used for "security problems" where the attacker destroys simply for the pleasure of destroying.

I believe we should centralize it in a "product" in the CVE Details, and add the security risk details for the protocols.

in

https://www.cvedetails.com/

Reply to this note

Please Login to reply.

Discussion

Ok, but what is actually happening? Who is doing what? It's I usually an issue in the specific client or relay and not on the protocol. But I have no idea what you mean by vandalism