Michael Sutton Quotes



Tweet
People | Submissions | Programs | Reward | Loyal |
comments powered by Disqus
This is relatively easy to exploit. It takes some degree of social engineering -- the attacker would have to draw people to a malicious Web site -- but after that, there's no further intervention required. An attacker could leverage this to write to a file on the hard drive. And once you can write to a person's machine, you have full control.
- Michael Sutton
