Bugtraq

Results: 8



#Item
1Computing / Computer architecture / Memory management / Software bugs / POSIX / Process / C standard library / Exit / Stack buffer overflow / Pointer / Segmentation fault / Stack

.oO Phrack 49 Oo. Volume Seven, Issue Forty­Nine File 14 of 16 BugTraq, r00t, and Underground.Org  bring you Smashing The Stack For Fun And Profit

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2008-08-26 17:57:09
2Computer security / Elias Levy / Buffer overflow / Privilege escalation / Bugtraq / Phrack / Heap overflow / Stack buffer overflow / Vulnerability / Software bugs / Software quality / Computing

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:11
3Social information processing / Electronic mailing lists / Email / Crime prevention / National security / Gordon Lyon / Vulnerability / SecurityFocus / Bugtraq / Computing / Computer security / Software

Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

Add to Reading List

Source URL: www.wilyhacker.com.

Language: English - Date: 2004-11-16 15:11:46
4Internet governance / WARP / Antivirus software / Bugtraq / United States Computer Emergency Readiness Team / Vulnerability / Microsoft Security Essentials / Debian / Full disclosure / Computer security / Software / Computing

WTB[removed]Document type: Reference Typical information sources for a WARP Filtered Warnings Service

Add to Reading List

Source URL: www.warp.gov.uk

Language: English - Date: 2014-09-22 09:11:24
5Software testing / Crime prevention / National security / Computer network security / Vulnerability / Full disclosure / Patch / Social vulnerability / Bugtraq / Software / Security / Computer security

Impact on Reported Software Vulnerabilities on the Market Value of Internet Security Firms

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
6Software testing / Hacking / Vulnerability / Responsible disclosure / Full disclosure / Computer network security / Bugtraq / Social vulnerability / Patch / Computer security / Cyberwarfare / Risk

The Likelihood of Vulnerability Rediscovery and the Social Utility of Vulnerability Hunting Andy Ozment∗ Computer Security Group Computer Laboratory, University of Cambridge http://www.cl.cam.ac.uk/users/jo262/

Add to Reading List

Source URL: infosecon.net

Language: English - Date: 2006-03-16 20:15:32
7Security / Hacking / Software testing / Vulnerability / Full disclosure / Patch Tuesday / Patch / Countermeasure / Bugtraq / Computer security / Cyberwarfare / Computer network security

Software failures have become more and more critical

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 2012-08-16 12:31:00
8Social information processing / Electronic mailing lists / Email / Crime prevention / National security / Gordon Lyon / Vulnerability / SecurityFocus / Bugtraq / Computing / Computer security / Software

Copyright 2003 AT&T and Lumeta. All Rights Reserved. Notice: For personal use only. These materials may not be reproduced or distributed in any form or by any means except that they may be downloaded from this source

Add to Reading List

Source URL: www.wilyhacker.com

Language: English - Date: 2004-11-16 15:11:46
UPDATE