Figure 1: An application with a simple format-string vulnerability can be manipulated to expose data on the stack using by using %08x.

Back to Article