Figure 1:
An application with a simple format-string vulnerability can be manipulated to expose data on the stack using by using %08x.
Back to Article