Arbitrary code execution

Results: 45



#Item
11Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
12Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / Social vulnerability / Arbitrary code execution / Privilege escalation / Buffer overflow / Computer security / Cyberwarfare / Software

! [removed]: [removed]: [removed]: [removed]: [removed]:

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-05-20 17:27:56
13Cloud clients / Portable software / Sandbox / Computer security / Arbitrary code execution / Privilege escalation / Malware / Mandatory Integrity Control / Vulnerability / Software / Google Chrome / Software testing

Sandbox Roulette: Are you ready for the gamble? Rafal Wojtczuk [removed] Rahul Kashyap [removed] What is a sandbox? In computer security terminology, a sandbox is an environment designed to run untrusted

Add to Reading List

Source URL: www.bromium.com

Language: English - Date: 2015-04-10 18:42:25
14Directory traversal attack / Ruby on Rails / Vulnerability / Remote file inclusion / CVSS / Glob / Exploit / Arbitrary code execution / Secure Shell / Cyberwarfare / Computing / Software

1 THE ANATOMY OF A RAILS VULNERABILITY The Anatomy of a Rail s Vulnerabil i ty C V E[removed]: Fro m Direc t o ry Trave rsal to S he ll May 27th, [removed]Jeff Jarmoc - [removed]

Add to Reading List

Source URL: matasano.com

Language: English - Date: 2014-12-15 11:36:45
15Hacking / Software testing / Cross-site scripting / Vulnerability / SQL injection / Privilege escalation / Uncontrolled format string / Arbitrary code execution / Buffer overflow / Cyberwarfare / Computer security / Failure

Benjamin Livshits and Monica S. Lam 1[removed].

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-08-06 17:30:40
16Hacking / Software testing / Cross-platform software / Debian / Arbitrary code execution / Vulnerability / Deb / Buffer overflow / Qualys / Cyberwarfare / Software / Computer security

153 Somerford Road, Christchurch, Dorset, BH23 3TY, UK Tel: + Fax: + Web: www.datatrackplc.com Email:

Add to Reading List

Source URL: www.datatrackplc.com

Language: English - Date: 2015-02-05 04:55:45
17Software / Computer network security / Software testing / Proprietary software / Zero-day attack / Kaspersky Lab / Vulnerability / Arbitrary code execution / Norton Internet Security / Computer security / Antivirus software / Cyberwarfare

MRG Effitas – Comparative Assessment of Kaspersky Internet SecurityAugustComparative Assessment of Kaspersky Internet SecurityAugust 2012

Add to Reading List

Source URL: expo-itsecurity.ru

Language: English - Date: 2012-11-20 03:02:40
18Internet / Hacking / Software testing / Vulnerability / Arbitrary code execution / Firmware / Computing / Network Time Protocol / Computer security

Innominate AG  Rudower Chaussee 13  12489 Berlin Rudower Chaussee[removed]Berlin T +[removed]F +[removed]

Add to Reading List

Source URL: www.innominate.com

Language: English - Date: 2015-01-20 09:35:16
19Computer security / Computer network security / Hacking / Software testing / Vulnerability / Zero-day attack / Address space layout randomization / Arbitrary code execution / Adobe Flash / Software / Computing / Cyberwarfare

ESET_Logo_HorizontalClaim-Gradient-CMYK

Add to Reading List

Source URL: www.welivesecurity.com

Language: English - Date: 2015-01-07 12:25:49
20Blog software / WordPress / Include vulnerability / Arbitrary code execution / Vulnerability / Firefox / Uploading and downloading / Software / Computing / PHP programming language

State of Alaska Cyber Security & Critical Infrastructure Cyber Advisory December 05, 2014 The following cyber advisory was issued by the State of Alaska and was intended for State government entities. The information may

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-12-08 17:18:25
UPDATE