An example of "buffer overflow" vulnerability:
The solution (2)

Did you try it?

Did the corrected program work as expected?

If the program did not work, please click here.

If the program did work as expected, please click here.

Last edited on 2010-10-17 17:02:44 by stolfi