Overflow

Results: 1424



#Item
121

Defending against heap overflow by using randomization in nested virtual clusters Chee Meng Tey and Debin Gao Singapore Management University, Singapore {cmtey.2008,dbgao}@smu.edu.sg

Add to Reading List

Source URL: flyer.sis.smu.edu.sg

Language: English - Date: 2014-12-17 01:40:50
    122

    Families involved in the Commonwealth overflow, On behalf of the Fort Bend ISD administration, I would like to once again thank you for your patience as we work to address your concerns and find a solution to avoid split

    Add to Reading List

    Source URL: campuses.fortbendisd.com

    Language: English
      123Software bugs / Computer errors / Debuggers / GNU Debugger / Shellcode / Python / Stack buffer overflow / Buffer overflow / .py / Computing / Software / Computer programming

      EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2014-12-24 15:06:41
      124Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

      Microsoft Word - CWEs_as_vuln_theory.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-07-18 14:25:17
      125Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

      =================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2006-09-13 14:57:16
      126

        COMPETITOR CAR PARK COMPLIMENTARY PASS Valid – 1 hour main car park Valid – All day in OVERFLOW

      Add to Reading List

      Source URL: www.trailmarathonwales.com

      - Date: 2015-06-09 06:11:04
        127Tort / Interpleader / Negligence / Trespass / Law / Tort law / Common law

        CIVIL CASE MANAGEMENT SHEET (see SLRfor required use) PARTIES (list overflow on separate sheets): Plaintiffs:

        Add to Reading List

        Source URL: courts.oregon.gov

        Language: English - Date: 2012-05-15 21:55:30
        128

        SUBLINE400U Model Code SUBLINE400U Description Single bowl undermount with overflow Accessories

        Add to Reading List

        Source URL: assets.selector.com

        Language: English - Date: 2014-05-28 03:26:13
          129Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

          Microsoft Word - unforgivable 3.doc

          Add to Reading List

          Source URL: cwe.mitre.org

          Language: English - Date: 2007-09-13 16:51:18
          130Orthography / English orthography / Occitan phonology / Linguistics / English phonology / Language

          B u ffe r o ve rflo w A buffer overflow condition exists when a program attem pts to put m ore data in a buffer than it can hold or when a program attem pts to put data in a m em ory area past a buffer. In this case, a b

          Add to Reading List

          Source URL: cwe.mitre.org

          Language: English - Date: 2006-09-13 14:57:15
          UPDATE