torifodor4136 torifodor4136 14-10-2022 Computers and Technology contestada after a program (running as normal user) disables a capability a, it is compromised by a buffer-overflow attack. the attacker successfully injects his malicious code into this program’s stack space and starts to run it. can this attacker us