Buffer overflow

Results: 538



#Item
381Computer programming / Software engineering / Arrays / Circular buffer / Buffer overflow / Buffer underrun / CWE / Improper input validation / Pointer / Software bugs / Computer memory / Computing

CWE-221: INFORMATION LOSS OR OMMISSION CWE-468:

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2010-06-24 10:13:13
382Computer programming / Pointer / Buffer overflow / Circular buffer / C / Stack / Integer overflow / Computing / Software bugs / Software engineering

Buffer  Overflow   SOFTWARE-FAULT SIGN ERRORS #194 #195 #196

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2012-04-18 10:37:37
383Data types / Software bugs / Primitive types / Arrays / Buffer overflow / Pointer / C / Memory corruption / Stack / Computing / Software engineering / Computer programming

Buffer Overflow Semantic template 1 SOFTWARE-FAULT SIGN ERRORS #194 #195

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2011-01-22 13:32:51
384Computer programming / Buffer overflow / Pointer / Circular buffer / C dynamic memory allocation / C / Integer overflow / Stack buffer overflow / Computing / Software bugs / Software engineering

SOFTWARE-FAULT SIGN ERRORS #194 #195 #196

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2014-01-06 11:41:07
385Software bugs / Address space layout randomization / PaX / Buffer overflow / Return-oriented programming / Malware / C / Stack / Pointer / Computing / Computer programming / Software engineering

Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein Boston University, MIT Lincoln Laboratory, and MIT CSAIL Abstract. Since the int

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
386C programming language / Data types / Primitive types / Software bugs / Constraint programming / Buffer overflow / C string handling / Pointer / Circular buffer / Software engineering / Computer programming / Computing

A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University of California, Berkeley

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2000-02-24 15:34:44
387Computer network security / Hacking / Vulnerability / Computer security / Google Chrome / Firefox / Buffer overflow / Pwnie Awards / Przemysław Frasunek / Software / Computing / Software testing

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-06-18 14:07:28
388Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-28 10:35:48
389Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
390Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
UPDATE