Heap overflow

Results: 84



#Item
11Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
12Software bugs / Cross-platform software / Heap spraying / Heap overflow / Shellcode / Computer errors / Heap feng shui / Alexander Sotirov / C dynamic memory allocation / Computing / Software engineering / Cyberwarfare

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:17
13ITunes / Multi-touch / IPhone / Smartphones / IOS / Social vulnerability / Buffer overflow / Heap overflow / IPod Touch / Computing / Apple Inc. / Software

security research Core GraphicsMemory Corruption CVEPDF Indexed colorspace buffer overflow Apple CoreGraphics library fails to validate the input when parsing the colorspace specification of a PDF XObject res

Add to Reading List

Source URL: www.binamuse.com

Language: English
14C++ / C Standard Library / C dynamic memory allocation / Memory management / Heap overflow / Circular buffer / C / Sizeof / D-ary heap / Computing / Computer programming / Software engineering

Glibc Adventures - The Forgotten Chunks

Add to Reading List

Source URL: www.contextis.com

Language: English - Date: 2015-06-05 11:57:30
15Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Uncontrolled format string / Stack overflow / Circular buffer / Malware / Computer virus / Software bugs / Computing / Software quality

10061872_blended_attacks_wp.qxp

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2004-07-12 15:53:15
16Software quality / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Address space layout randomization / PaX / Heap overflow / Return-to-libc attack / Exec Shield / Software bugs / Computing / Computer security

(un) Smashing the Stack: 66ee66dd66bb 33aa6e

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
17Software engineering / C Standard Library / C dynamic memory allocation / Memory management / Heap spraying / Address space layout randomization / Heap feng shui / Alexander Sotirov / Buffer overflow protection / Computing / Computer programming / Software bugs

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
18Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:59:36
19Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
20Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
UPDATE