Dirty Cow, Holy Cow!

As regular readers of this blog will be well aware, we have a special place in our hearts for proper vulnerabilities with their own funky name, logo, the works. Not only does it make ideas for this piece easier, these named and shamed issues nearly always exploit an error in ages-old code, often on Unix […]