Quote:
Originally Posted by pavel-s
@knc1, Does it mean that it can be exploited? I'm pretty new to this could you "unpack" it a bit?
The most closest I found is this "buffer overflow" chapter from "Computer Security: A Hands-on Approach" 
|
I do not have the slightest idea.
I only noted that the analysis routines automatically found something very difficult to find without any help from me.
AND
It is about $2,000/year cheaper than IDA Pro.