@attritionorg I entered "web security" in 2000, so can't speak much about 1999, but even then, SQLi vulns were very rare to hear about.
@gdead @stevewerby @jeremiahg refernce for 72 overflow, where it is called "overflow"?
-
-
@attritionorg@stevewerby@jeremiahg section 3.2 in previous doc. Doesn't use term "overflow" but talks about abuse of contiguous memory -
@gdead@attritionorg@stevewerby@jeremiahg Many of the vulnerabilities are just named differently (i.e., insufficient argument validation) -
@youbetyourballs@gdead@attritionorg@stevewerby@jeremiahg Most are just memory corruption bugs by another name... Check 3.2-3.4
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.