Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if it does it's a pretty remote possibility that it'll be exploitable if you limit the input to say 100 bytes. Pretty hard to get a Perl or Ruby level program of that size to exploit some memory corruption at the C level.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: