Skip to content
Better HN
Top
New
Best
Ask
Show
Jobs
Search
⌘K
undefined | Better HN
0 points
nmadden
5y ago
0 comments
Share
That’s just the first example. As the author of that series writes, most of the exploits are not due to memory corruption. Most are confused deputy attacks where privileged code can be tricked into performing dangerous operations.
0 comments
default
newest
oldest
saagarjha
5y ago
Oh, I don't doubt it. I'm just saying that the particular example you linked wasn't that great.
j
/
k
navigate · click thread line to collapse