Content deleted Content added
add asciiz exploits, which was part of the earlier material, even though "null character" currently is minimal in exploit coverage, add ref |
Some are... and why does this belong in the lead? |
||
Line 5:
{{Notability|date=March 2008}}
A '''string exploit''' is a [[security exploit]] involving handling of [[String (computer science)|string]] data in computer software.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}</ref>
Examples include:
|