Wikipedia:Articles for deletion/String exploits
Appearance
- String exploits (edit | talk | history | protect | delete | links | watch | logs | views) – (View log)
- (Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL)
I cannot find any citations that establish notability. Plenty of cites for format string attacks, but not for the exploit described here. Article has had unreferenced tag since December 2009, Notability tag and Technical tags since March 2008. Last edit (other than minor typo fixes and such) was in 2007, and there have never been any discussions on the talk page. Guy Macon 22:53, 19 February 2011 (UTC)
- Note: This debate has been included in the list of Computing-related deletion discussions. -- • Gene93k (talk) 01:55, 20 February 2011 (UTC)
- Delete. It's also extremely unclear and downright inaccurate; for example, many languages have comment characters but most of those languages only obey them when parsing program files for execution, not user input. Elizium23 (talk) 02:19, 20 February 2011 (UTC)
- Comment Google search on "Asciiz exploit" produces hits. "Comment character exploit" also shows some hits such as this one. So this may not be a question of "is this notable", since the idea of "exploits using strings" seems to be both notable and interesting, but "is this salvageable". Have all of the major editors been notified? Unscintillating (talk) 04:45, 20 February 2011 (UTC)
- Strange, I find no Google search results for ["Comment character exploit"] (with quotes). The link you give is about SQL injection, on which we do have an article. The present article is so unclear that I'm not sure what the topic is, but it may be an attempt to create an article about "Unchecked user input", as it is called in our article on Vulnerability (computing), or "Improper input validation", as it is called in the Common Weakness Enumeration repository (entry CWE-20). This is definitely a notable topic, but content-wise the present article String exploits is unsalvageable. --Lambiam 09:38, 20 February 2011 (UTC)
- Seconded; it might in principle be a notable topic but the content would have to be redone from scratch. I think it's probably best to redirect it, until anybody ever actually manages to write encyclopaedic content on this subject. bobrayner (talk) 23:24, 20 February 2011 (UTC)
- Strange, I find no Google search results for ["Comment character exploit"] (with quotes). The link you give is about SQL injection, on which we do have an article. The present article is so unclear that I'm not sure what the topic is, but it may be an attempt to create an article about "Unchecked user input", as it is called in our article on Vulnerability (computing), or "Improper input validation", as it is called in the Common Weakness Enumeration repository (entry CWE-20). This is definitely a notable topic, but content-wise the present article String exploits is unsalvageable. --Lambiam 09:38, 20 February 2011 (UTC)
- Delete By itself it is not notable, and the article only discusses concatenation without highlighting how this, by itself, is an exploit. I believe that other articles such as Vulnerability (computing) already cover this area. --HighKing (talk) 11:58, 21 February 2011 (UTC)
- Delete I just looked at Vulnerability (computing) and asked myself if this article gives the reader anything not found there. Nothing as far as I can tell. Guy Macon 13:31, 21 February 2011 (UTC)
- Keep It seems to me to be a disambiguation page, with a lot of needless yack and opinion. Added a source, dropped the yack, dropped the opinion. Format isn't right. Shajure (talk) 06:29, 22 February 2011 (UTC)