Buffer overflow

Results: 538



#Item
441Computer network security / Software testing / 105th United States Congress / Software bugs / Hacking / Digital Millennium Copyright Act / Buffer overflow / Vulnerability / Denial-of-service attack / Computer security / Cyberwarfare / Computing

Daniel McEnnis Proposal to exempt source code from protection under the anti-circumvention clause of the DMCA where source code is defined as a human readable description and/or

Add to Reading List

Source URL: www.copyright.gov

Language: English - Date: 2014-08-15 09:38:44
442Computer network security / Hacking / Software testing / Attack surface / Vulnerability / Exploit / Buffer overflow / Application security / SAP AG / Computer security / Cyberwarfare / Computing

Measuring the Attack Surfaces of SAP Business Applications Pratyusa K. Manadhata1 Yuecel Karabulut2 Jeannette M. Wing1 May 2008

Add to Reading List

Source URL: reports-archive.adm.cs.cmu.edu

Language: English - Date: 2008-06-13 18:01:26
443Software bugs / Software testing / Hacking / SAINT / Buffer overflow / Vulnerability / Exploit / Stack buffer overflow / Cross-site scripting / Cyberwarfare / Computer security / Failure

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:16:25
444Software testing / Computer network security / Common Weakness Enumeration / Hacking / Software quality / Electronic commerce / Vulnerability / CWE / Buffer overflow / Computer security / Cyberwarfare / Software

Common Weakness Scoring System — CWSS™ Scoring the Severity of Software Weaknesses CWSS is a mechanism for scoring the severity of Common Weakness Enumeration (CWE™) entries discovered in an enterprise’s software

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:54
445Occitan phonology / English phonology / Language / English orthography

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
446Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-06-07 12:01:36
447Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWE[removed]CWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
448Software testing / Hacking / Computer network security / Cloud computing / Veracode / Vulnerability / CWE / Software quality / Buffer overflow / Computing / Software engineering / Computer security

Common Weakness Enumeration — CWE™ A Community-Developed Dictionary of Software Weakness Types CWE, targeted to developers and security practitioners, is a formal list of software weaknesses that: Serves as a common

Add to Reading List

Source URL: makingsecuritymeasurable.mitre.org

Language: English - Date: 2013-07-08 10:01:53
449Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
450Computer network security / Hacking / Software testing / Vulnerability / Cross-platform software / Scripting languages / Cross-site scripting / Cross-site request forgery / Buffer overflow / Cyberwarfare / Computer security / Computing

Microsoft Word - Vulnerability Type Distributions in CVE.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-06-07 12:03:43
UPDATE