Uninformed Journal
October 22nd, 2007, 12:22
This paper describes a technique that can be applied in certain situations to gain arbitrary code execution through software bugs that would not otherwise be exploitable, such ...
http://uninformed.org/?v=4&a=5&t=sumry
http://uninformed.org/?v=4&a=5&t=sumry