Uninformed Journal
October 22nd, 2007, 12:22
Nearly all existing exploitation vectors depend on some knowledge of a process' address space prior to an attack in order to gain meaningful control of execution flow. In cases where this is necessary, exploit ...
http://uninformed.org/?v=2&a=2&t=sumry
http://uninformed.org/?v=2&a=2&t=sumry