http://www.w3.org/ns/prov#value | - And worst, the exploit still needs to rely on the victim's machine actually DOING SOMETHING to be potentially vulnerable, in this case, rebooting, or renewing a DHCP lease, which are actions that seldom happen, especially on a network full of idling desktop boxes.
|