Exploiting a “Simple” Vulnerability, Part 2 – What If We Made Exploitation Harder?

[…]