top | item 39902150

(no title)

CommitSyn | 1 year ago

Is it possible it was part of a planned or current exploit chain, some other way it could have been utilized?

discuss

order

wholinator2|1 year ago

Yes, i think one thing we should learn from this is that suspicious code is suspicious code, and anyone asserting that some suspicious code cannot be exploited is suspicious themselves. I don't think we should inquisition half the industry, but i do think people should be a lot more careful about saying that one small exploitable thing definitely cannot be part of a larger exploit.

It's obvious, basically no one knows what's going on in the _vast_ majority of code running out systems these days. And even if you know 99% the attackers only need to be right once