![]() ![]() Buffer overflows found in widely used server products are likely to become widely known and can pose a significant risk to users of these products. By sending carefully crafted input to a web application, an attacker can cause the web application to execute arbitrary code – effectively taking over the machine.īuffer overflow flaws can be present in both the web server or application server products that serve the static and dynamic aspects of the site, or the web application itself.
0 Comments
Leave a Reply. |