The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was keep. Ron Ritzman (talk) 01:41, 26 February 2011 (UTC)[reply]

[header inserted with revised article name 22:01, 22 February 2011 (UTC)] Unscintillating (talk) 22:01, 22 February 2011 (UTC) [reply]

String exploits (edit | talk | history | protect | delete | links | watch | logs | views) – (View log)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

I cannot find any citations that establish notability. Plenty of cites for format string attacks, but not for the exploit described here. Article has had unreferenced tag since December 2009, Notability tag and Technical tags since March 2008. Last edit (other than minor typo fixes and such) was in 2007, and there have never been any discussions on the talk page. Guy Macon 22:53, 19 February 2011 (UTC)[reply]

Given the improvements made since I wrote the above, I think the article is now worth keeping. Does anyone think it should be deleted? If not, do I need to do something special to withdraw the afD or just let it run its course? Guy Macon 02:40, 23 February 2011 (UTC)[reply]
One of the good things about something being in the AfD process is that people look at it who might not otherwise. One or more may still wander along and make great improvements. Always better to let them run unless they are time wasters... and I think this article still needs much love, so not a waster. Thanks for tagging it.Shajure (talk) 06:52, 23 February 2011 (UTC)[reply]

*Delete. It's also extremely unclear and downright inaccurate; for example, many languages have comment characters but most of those languages only obey them when parsing program files for execution, not user input.

*Delete I just looked at Vulnerability (computing) and asked myself if this article gives the reader anything not found there. Nothing as far as I can tell. Guy Macon 13:31, 21 February 2011 (UTC)[reply]

The above was true of the article at that time, but is not true now that the article has been rewritten. Guy Macon 02:40, 23 February 2011 (UTC)[reply]
I added a couple of references using the term "exploit string" and removed the notability template.  Unscintillating (talk) 22:07, 22 February 2011 (UTC)[reply]
Sources discussing beer bottles will not help to establish that Bottle beer is a good article title. If the article title here was Exploit string, then it might make sense to cite sources using that term. However, the title is "String exploit", and the added references, none of which uses that term, do not undercut my point that this is not a commonly used term.  --Lambiam 22:56, 23 February 2011 (UTC)[reply]
The fact of the matter is that "String exploit" isn't a commonly used term. The actual exploit described is well known, but the usual term used to describe it is something along the lines of "unvalidated user input exploit" or "unchecked form input exploit" (not sure what exact wording is most common, but it isn't "string exploit). A better name would be a big improvement. Guy Macon 01:35, 24 February 2011 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.