Hacker News new | past | comments | ask | show | jobs | submit login

Presumably it needs to be run by someone who already has access to the computer and gives them (or a program executed by them) root/escalated privileges. Although that might include running code from a webpage etc.



Including an advertiser on a webpage.


Do you have proof of concept? If it would be exploitable from the browser, it would be huge.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: