Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

Yeah, but look at what he says in the first link:

Before contacting the submitter, we want to be sure that we weren't missing something, but after looking at it from every angle, we still couldn't see what the issue was.

...Stumped, we contacted the submitter. "From what we can tell, the call to system takes place before you call the Load­Keyboard­Layout function. Can you elaborate on how this constitutes a vulnerability in the Load­Keyboard­Layout function?"



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: