Buffer overflow

Results: 538



#Item
451Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
452Computer network security / Security / Hacking / Vulnerability / Buffer overflow / Cyberwarfare / Computer security / Software testing

CWE - Introduction to Vulne...

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2009-10-29 16:20:36
453Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
454Orthography / English orthography / Occitan phonology / Linguistics / English phonology / Language

B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:15
455Cross-platform software / Software testing / Programming language implementation / Buffer overflow / Vulnerability / Compiler / Analysis / Java / C / Computing / Software engineering / Computer programming

International Journal of Smart Home Vol. 6, No. 4, October, 2012 Design and Implementation of the Compiler with Secure Coding Rules for Developing Secure Mobile Applications in Memory Usages YunSik Son1, YangSun Lee2 and

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2012-10-31 09:56:26
456Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
457Hacking / Software testing / Computer network security / Vulnerability / Adobe Acrobat / Cross-site scripting / Firefox / Privilege escalation / Buffer overflow / Software / Computing / Microsoft Windows

State of Tennessee Department of Finance and Administration Office for Information Resources Security Policy and Audit Security Advisory Summary

Add to Reading List

Source URL: www.nettn.net

Language: English - Date: 2010-09-16 14:51:14
458Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Heap overflow / Pointer / C dynamic memory allocation / Stack / Segmentation fault / Computing / Software engineering / Software bugs

ValueGuard: Protection of native applications against data-only buffer overflows Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, and Frank Piessens IBBT-Distrinet Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2011-05-26 17:50:53
459Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
460Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security

Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-27 15:05:36
UPDATE