Hacker News new | past | comments | ask | show | jobs | submit login

It's the ultimate in vulnerabilities. Remote code execution over the network, potentially as root.



> It's the ultimate in vulnerabilities.

As someone who has survived the 1990's scare-a-palooza of Sendmail exploits, and ssh before separation of privileges, and on and on - no, it's not. Not even close.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: