Buffer overflow

Results: 538



#Item
411Software bugs / MIT-SHM / Linux / X86 architecture / Xephyr / X Window System / Buffer overflow protection / X86-64 / Linux kernel / Software / System software / Computing

Exploiting large memory management vulnerabilities in Xorg server running on Linux version 1.0 Rafal Wojtczuk Invisible Things Lab

Add to Reading List

Source URL: www.invisiblethingslab.com

Language: English - Date: 2010-08-17 11:15:49
412Software / Windows NT / Computer architecture / Automation / Wonderware / Windows XP / Invensys / Windows / CVSS / Windows Server / Microsoft Windows / Computing

Invensys Operations Management Security Alert Title Wonderware InBatch and Foxboro I/A Series Batch Server lm_tcp buffer overflow (LFSEC00000051) Rating Medium Published By

Add to Reading List

Source URL: iom.invensys.com

Language: English - Date: 2011-02-21 12:23:56
413Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
414Software bugs / Subroutines / Assembly languages / Central processing unit / Machine code / Calling convention / X86 assembly language / Buffer overflow protection / Stack buffer overflow / Computing / Computer architecture / Software engineering

Return-Oriented Programming: Systems, Languages, and Applications RYAN ROEMER, ERIK BUCHANAN, HOVAV SHACHAM and STEFAN SAVAGE University of California, San Diego We introduce return-oriented programming, a technique by

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2011-07-08 15:31:37
415Software bugs / Coccinelle / OCaml / Buffer overflow / Linux kernel / Valgrind / Debian / C dynamic memory allocation / C standard library / Software / Computing / Computer programming

Hunting bugs with Coccinelle Department of Computer Science, University of Copenhagen Henrik Stuart 8th August 2008 Abstract

Add to Reading List

Source URL: www.emn.fr

Language: English - Date: 2008-09-29 10:30:00
416Software bugs / Shellcode / Buffer overflow / Malware / Software testing / Arbitrary code execution / Binary translation / QEMU / Code injection / Software / System software / Cyberwarfare

S HELL OS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill, {kzsnow, kri

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-06-09 13:31:36
417Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
418Software bugs / Type theory / Void type / Stack / Subroutine / Stack buffer overflow / Computer programming / Computing / Software engineering

Exploit-Generation with Acceleration Daniel Kroening, Matt Lewis, Georg Weissenbacher ●

Add to Reading List

Source URL: crest.cs.ucl.ac.uk

Language: English - Date: 2013-06-03 11:21:47
419Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-08 14:53:11
420Software testing / Computer network security / Common Weakness Enumeration / Hacking / Software quality / Electronic commerce / Vulnerability / CWE / Buffer overflow / Computer security / Cyberwarfare / Software

Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:54
UPDATE