Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Based on the hundreds, perhaps thousands of critical vulnerabilities that are due directly to parsing user input in memory-unsafe languages, usually resulting in remote code execution, how's this for a threat model: attacker can send crafted input that contains machine code that subsequently runs with the privileges of the process parsing the input. That's bad.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: