Buffer overflow

Results: 538



#Item
421Software testing / Hacking / Computer network security / Cloud computing / Veracode / Vulnerability / CWE / Software quality / Buffer overflow / Computing / Software engineering / Computer security

Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common

Add to Reading List

Source URL: measurablesecurity.mitre.org

Language: English - Date: 2013-07-08 10:01:53
422Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
423Computer emergency response team / Computing / Vulnerability / Request Tracker / United States Computer Emergency Readiness Team / Buffer overflow / Computer security / Cyberwarfare / Carnegie Mellon University

EISPP - Overview • EU-funded (5th framework programme, IST[removed]) • Duration: June 2002 to January 2004 • „Successful conclusion“ of project acknowledged by EC in February 2004 • Project partners:

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2004-05-31 05:28:06
424Computer network security / Software testing / Hacking / Metasploit Project / Penetration test / Exploit / Nessus / Attack / Buffer overflow / Computer security / Cyberwarfare / Software

Metasploit Penetration Testing Cookbook Abhinav Singh Chapter No. 4

Add to Reading List

Source URL: www.packtpub.com

Language: English
425Computer security / Spamming / Honeypot / Electronic commerce / Secure communication / Buffer overflow / Computing / Gerd Tellenbach / Evasion / Computer network security / Cyberwarfare / Security

Celeste - Distributed Secure Storage

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2007-09-26 07:40:06
426Software testing / Computer network security / Hacking / Vulnerability / CVSS / Cross-site scripting / Buffer overflow / Common Vulnerabilities and Exposures / Code injection / Cyberwarfare / Computer security / Failure

25 Years of Vulnerabilities: [removed]RESEARCH REPORT Yves Younan Senior Research Engineer TM

Add to Reading List

Source URL: community.qualys.fr

Language: English - Date: 2014-05-08 22:50:06
427Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
428Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: seanhn.files.wordpress.com

Language: English - Date: 2009-09-06 11:29:07
429Memory management / C Standard Library / Pointer / C programming language / C dynamic memory allocation / C / Sizeof / Buffer overflow / Heap overflow / Computing / Software engineering / Computer programming

Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue ([removed]) Microsoft Security Engineering Center (MSEC)

Add to Reading List

Source URL: www.hackitoergosum.org

Language: English - Date: 2010-04-23 08:06:57
430Computer network security / Risk / CVSS / Vulnerability / Security risk / Social vulnerability / IT risk / Exploit / Buffer overflow / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: www.first.org

Language: English - Date: 2010-07-15 12:31:42
UPDATE