Exploit

Results: 786



#Item
671Cyberwarfare / Espionage / Rogue software / Multi-agent systems / Spamming / Rogue security software / Spyware / Crimeware / Pharming / Malware / System software / Computer network security

Manufacturing Compromise: The Emergence of Exploit-as-a-Service 2 †

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2012-08-23 01:26:08
672

COMMUNIQUÉ POUR DIFFUSION IMMÉDIATE RENDRE LES MATHÉMATIQUES SYMPATHIQUES Un exploit signé Jean-Marie De Koninck

Add to Reading List

Source URL: www.septembre.com

Language: French - Date: 2008-11-28 09:40:07
    673Primary care / Mayo Clinic / Mayo Clinic Center for Innovation / Rochester /  Minnesota / Medical home / California HealthCare Foundation / Geisinger Health System / Health care / Kaiser Permanente / Health / Medicine / Healthcare

    Innovation and Improvement Behind the Scenes H ospitals and health systems are creating new entities to explore and exploit

    Add to Reading List

    Source URL: www.chcf.org

    Language: English - Date: 2010-07-19 18:11:10
    674

    1 Forêts TD : l’environnement au cœur de notre entreprise En 2010, nous avons accompli tout un exploit en devenant la première banque nord-américaine à afficher un bilan neutre en carbone. Pour nous, c’était

    Add to Reading List

    Source URL: www.td.com

    Language: French - Date: 2013-03-04 20:29:03
      675Cross-platform software / Java platform / Computer file formats / Adobe Flash / Shellcode / Malware / JAR / JavaScript / Adobe Acrobat / Software / Computing / Graphics file formats

      Threat Advisory: Blackhole Exploit Kit

      Add to Reading List

      Source URL: kc.mcafee.com

      Language: English
      676Security / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Crimeware / Malware / Exploit / Zero-day attack / Computer network security / Cyberwarfare / Computer security

      Vertical Insight[removed]Data Breach Investigations Report MANUFACTURING Data breaches can be

      Add to Reading List

      Source URL: www.verizonenterprise.com

      Language: English - Date: 2014-05-12 20:00:00
      677Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

      Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

      Add to Reading List

      Source URL: capec.mitre.org

      Language: English - Date: 2007-03-13 14:59:22
      678Software bugs / Type theory / Void type / Stack / Subroutine / Stack buffer overflow / Computer programming / Computing / Software engineering

      Exploit-Generation with Acceleration Daniel Kroening, Matt Lewis, Georg Weissenbacher ●

      Add to Reading List

      Source URL: crest.cs.ucl.ac.uk

      Language: English - Date: 2013-06-03 11:21:47
      679Physical geography / Marine biology / Physical oceanography / Seamount / Census of Marine Life / Tasmanian Seamounts / Global Census of Marine Life on Seamounts / Biology / Oceanography / Fisheries

      IDEA 194 International Polar Year Proposal EXPOSE: Exploration of polar seamounts (AD Rogers, British Antarctic Survey) Introduction EXPOSE is an exploratory project that aims to exploit the international nature of IPY t

      Add to Reading List

      Source URL: classic.ipy.org

      Language: English - Date: 2005-01-25 13:57:16
      680Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

      Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

      Add to Reading List

      Source URL: www.exploit-db.com

      Language: English - Date: 2010-12-28 00:16:40
      UPDATE