logoalt Hacker News

tptacekyesterday at 5:37 PM1 replyview on HN

Specifically: the exploit extracted the admin's credentials from the database. A blind SQLI POC would simply demonstrate the existence of a timing channel based on a pathological input.


Replies

cushychickenyesterday at 9:01 PM

One other commenter asked a decent question - does going lighter (Zig) or harder on memory safety (Rust) confer any meaningful advantages against the phenomenon you describe?