Hacker News new | past | comments | ask | show | jobs | submit login

Ok but it is a lot more "gapped". A buffer overflow vulnerability is a lot more unlikely to be exploitable if you can't extend arbitrarily the amount of data passed and you have very little room to manipulate it (and it is so if the target has at least a vague knowledge of the format of the data).



Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: