Buffer overflow

Results: 538



#Item
401Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
402Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
403Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
404Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
405Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
406Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
407Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
408Software bugs / Buffer overflow / Shellcode / Machine code / NOP / Data structure alignment / Memory address / Instruction set / Forth / Computing / Software engineering / Computer architecture

STRIDE: POLYMORPHIC SLED DETECTION THROUGH INSTRUCTION SEQUENCE ANALYSIS P. Akritidis1, E. P. Markatos1, M. Polychronakis1, and K. Anagnostakis2 1

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:45:13
409Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
410Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
UPDATE