I'm not convinced the contents of the buffer are in attacker's control; did anyone conduct some investigation?
I'm not convinced the contents of the buffer are in attacker's control; did
anyone conduct some investigation?