Hacker News new | past | comments | ask | show | jobs | submit login

It is in the sense that the author did specify AFAIK the bounds within it should run, no?



Where and when? If I had installed qmail on a 64 bit machine in 2004, how would I have known that it was remotely exploitable?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: