Question: when did security analysts start describing leveraged exploit paths as "primitives"? Did this start with the FORCEDENTRY JBIG2 exploit or does this terminology have a longer history, maybe in gadget-based exploitation?

projectzero.google/2026/01/pix

0

If you have a fediverse account, you can quote this note from your own instance. Search https://mastodon.social/users/mhoye/statuses/115900698203884555 on your instance and quote it. (Note that quoting is not supported in Mastodon.)