Buffer overflow

Results: 538



#Item
431Software bugs / Address space layout randomization / PaX / Buffer overflow / Stack buffer overflow / Heap overflow / JIT spraying / Uncontrolled format string / Heap spraying / Computer security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-07-17 11:27:12
432Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
433C Standard Library / Computer errors / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / MOV / X86 / Printf format string / Computing / Computer architecture / Software bugs

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:37
434Software engineering / Return-to-libc attack / Address space layout randomization / PaX / Buffer overflow / NX bit / Exec Shield / Stack overflow / Stack / Software bugs / Computing / Software quality

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-12-31 02:53:49
435Extensible Storage Engine / Base64 / Write / Buffer overflow / Truevision TGA / Computing / Internet standards / Pointer

PDF Document

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-07-23 21:16:22
436Software bugs / Software testing / Hacking / SAINT / Buffer overflow / Exploit / Vulnerability / Stack buffer overflow / Cross-site scripting / Cyberwarfare / Computer security / Computing

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:15:47
437System software / Return-to-libc attack / PaX / Address space layout randomization / NX bit / Buffer overflow / Exec Shield / Stack / ASCII / Software bugs / Computing / Software

PDF Document

Add to Reading List

Source URL: force.vnsecurity.net

Language: English - Date: 2010-08-12 21:04:43
438Security / Computer network security / Hacking / Software testing / Attack surface / Vulnerability / Buffer overflow / RSA / Stack / Computer security / Cyberwarfare / Electronic commerce

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. XX, NO. X, MONTH[removed]An Attack Surface Metric Pratyusa K. Manadhata, Member, IEEE, and Jeannette M. Wing, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2010-05-13 19:55:15
439Software testing / Computer network security / Software bugs / Hacking / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Security

Comments template for Preliminary Cybersecurity Framework # Organization

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-10 15:50:03
440Software bugs / C Standard Library / Return-to-libc attack / Hacking / Software testing / Procedural programming languages / Return-oriented programming / Buffer overflow / Arbitrary code execution / Computing / Cyberwarfare / Computer security

App Store for Massive Scale Software Diversity

Add to Reading List

Source URL: www.marshallplan.at

Language: English - Date: 2012-12-12 21:32:39
UPDATE