Here’s what Senrio did say about the problem: This vulnerability can be exploited with a single command which contains custom assembly code and a string crafted to exercise the overflow. Read more at Network World |
Comments are closed.
|
Archives
August 2018
Categories |