Hacker News new | past | comments | ask | show | jobs | submit
In certain circumstances, they might be :-)

But you can't "hack a server" using just these techniques: they would be a (small) part of a chain of exploits.