<--- Back to Details
First PageDocument Content
Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare
Date: 2007-07-18 14:25:17
Computer security
Buffer overflow
Heap overflow
Circular buffer
Integer overflow
Vulnerability
Code injection
Pointer
Stack overflow
Computing
Software bugs
Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Download Document from Source Website

File Size: 136,15 KB

Share Document on Facebook

Similar Documents

Heap and BSS Overflow Ⅱ Arbro on-02-19

DocID: 1uD4u - View Document

Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

DocID: 1qEiC - View Document

Computing / Software engineering / Software bugs / Computer programming / Computer memory / C standard library / Address space layout randomization / Buffer overflow / Heap overflow / C dynamic memory allocation / Pointer / Memory safety

Data Randomization Cristian Cadar Microsoft Research Cambridge, UK

DocID: 1qxLg - View Document

Software bugs / Computing / Software engineering / Computer programming / Computer errors / Subroutines / Memory management / Stack / Buffer overflow / Call stack / Stack buffer overflow

b The heap sucks The Stack is Back – Jon Oberheide

DocID: 1pRdF - View Document

Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

$hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

DocID: 1p8BX - View Document