Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
Kim_Bruning
on April 29, 2014
|
parent
|
context
|
favorite
| on:
Exec($_GET
Well, in a sense maybe, but not on purpose there. The programmer had missed a bounds check.
ASneakyFox
on May 1, 2014
[–]
I think you're giving him too much credit. The input was not sanitized. Now its no one programmers fault. It was a long living bug many had a chance to see it and correct it for a long time. It was rooted in the same carelessness as exec(GET)
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: