Content deleted Content added
add ref for "exploit string" |
add another ref with "exploit string" and remove notability template |
||
Line 3:
<!-- For administrator use only: {{Old AfD multi|page=String exploits|date=19 February 2011|result='''keep'''}} -->
<!-- End of AfD message, feel free to edit beyond this point -->
A '''string exploit''' is a [[security exploit]] involving handling of [[String (computer science)|string]] data in computer software.<ref name=hacking>{{cite book|title=Hacking: the art of exploitation|series=No Starch Press Series|publisher=Safari Books Online|first=Jon|last=Erickson|Edition=2, illustrated|year=2008|ISBN= 9781593271442}}</ref><ref>
{{cite web
Line 10 ⟶ 9:
| date = February 27, 2003
| publisher = derkeiler.com
| accessdate = February 22, 2011
}}
</ref><ref>
{{cite web
| url = http://security.ece.cmu.edu/aeg/aeg-current.pdf
| title = AEG: Automatic Exploit Generation
| author = Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley
| date = 2010
| ___location = Pittsburgh
| publisher = ece.cmu.edu
| quote = The exploit string can be directly fed into the vulnerable application...
| accessdate = February 22, 2011
}}
|