Exploit

Results: 786



#Item
341Water crisis / International development / Earth / Water management in the Metropolitan Region of São Paulo / SATREPS / Environment / Japan International Cooperation Agency / Environmental protection

Issue-Specific Activities and Initiatives Global Environment Environmental Destruction: Meant for People, Yet Works against People When people living in developing countries over-exploit natural resources to meet their

Add to Reading List

Source URL: www.jica.go.jp

Language: English - Date: 2012-09-18 06:15:53
342

Remote Monitoring & Deployment Solutions FINFLY EXPLOIT PORTAL Standard Deployment methods for Remote Monitoring Solutions can often not be applied when dealing with well-trained and extremely careful Targets as they are

Add to Reading List

Source URL: s3.amazonaws.com

Language: English - Date: 2013-11-18 06:39:02
    343Security / Software testing / Hacking / Zero-day attack / Vulnerability / Cross-site scripting / Application firewall / Exploit / Malware / Computer security / Cyberwarfare / Computer network security

    A TRENDLABS SECURITY ADVISORY ON THE RECENT ATTACK AGAINST WEB APPLICATION VULNERABILITIES Conducting Business on the Web

    Add to Reading List

    Source URL: www.trendmicro.com

    Language: English - Date: 2014-10-06 22:54:01
    344Shellcode / Heap spraying / Heap overflow / Software testing / Computer network security / Arbitrary code execution / Address space layout randomization / Exploit / Vulnerability / Cyberwarfare / Computer security / Failure

    Detecting Web Browser Heap Corruption Attacks Stephan Chenette Moti Joseph

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    345IPhone / Electronics / ITunes / Multi-touch / IOS / MobileMe / Computing / Apple Inc. / Smartphones

    Windows GDI Local Kernel Memory Overwrite Vulnerability researched and exploit developed by Joel Eriksson <>

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:37
    346Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

    TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

    Add to Reading List

    Source URL: media.blackhat.com

    Language: English - Date: 2012-07-22 17:40:37
    347Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

    WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

    Add to Reading List

    Source URL: www.fireeye.jp

    Language: English - Date: 2015-04-30 23:03:41
    348Technology transfer / Radio-frequency identification / Technology / Automatic identification and data capture / Isis Innovation

    Exploit new tech for competitiveness: ITF Projects Commercialisation Workshop Date: 23 & 24 Apr 2015 Time: 14:00 – 17:30

    Add to Reading List

    Source URL: www.hkrita.com

    Language: English - Date: 2015-04-12 23:29:10
    349Accounting software / XBRL / Finance / Markup languages / XLink / Fujitsu / Financial statement / Windows Vista / XBRLS / Business / Accountancy / Computing

    Datasheet Fujitsu Interstage XWand V12 Datasheet Fujitsu Interstage XWand V12 Exploit The Total Power Of XBRL

    Add to Reading List

    Source URL: www.fastware.com

    Language: English - Date: 2012-07-24 20:06:47
    350Avionics / Command and control / Geodesy / Global Positioning System / Nuclear command and control / Surveying / Fishing vessel / Technology / Military science / Navigation

    ThemaMap: from data to maps Jacques Madelaine, GREYC - CNRS UMR 6072, Universit´e de Caen Basse-Normandie, (France) Gilles Domalain, IRD - UMR 212 EME (Ecosyst`emes Marins Exploit´es), Gill

    Add to Reading List

    Source URL: imdis2013.seadatanet.org

    Language: English
    UPDATE