Privilege escalation

Results: 82



#Item
41Software / Cross-platform software / JavaScript / Cross-site scripting / Privilege escalation / Mobile application development / World Wide Web / Computing / Scripting languages / Software engineering

Bifocals: Analyzing WebView Vulnerabilities in Android Applications Erika Chin and David Wagner University of California, Berkeley {emc, daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:39
42Computer network security / CVSS / Vulnerability / Siemens / Cisco IOS / WinCC / Password / Privilege escalation / United States Computer Emergency Readiness Team / Computer security / Technology / Cyberwarfare

Siemens Security Advisory by Siemens ProductCERT SSA[removed]: Vulnerabilities in iOS App SIMATIC WinCC Sm@rtClient

Add to Reading List

Source URL: www.siemens.com

Language: English - Date: 2015-01-13 04:35:36
43Software testing / Computer network security / Hacking / Software bugs / Vulnerability / Application security / Windows / Privilege escalation / Penetration test / Computer security / Cyberwarfare / Computing

INSECURITY IN SECURITY SOFTWARE MORGENSTERN ET AL. INSECURITY IN SECURITY SOFTWARE Maik Morgenstern AV-Test GmbH, Klewitzstr. 7, 39112 Magdeburg,

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
44Authentication / Operating system / Privilege escalation / Java Authentication and Authorization Service / Computer security / Security / Authorization

Authorization Services Programming Guide Contents Introduction to Authorization Services Programming Guide 4

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2015-02-09 20:58:04
45Electronic commerce / PayPal / End-user license agreement / Internet privacy / App Store / Credit card / Privilege escalation / Section 230 of the Communications Decency Act / Technology / Apple Inc. / Computer law

APPMACHINE Terms & Conditions Version 1.3 – last revisited: 7 January 2015 These Terms & Conditions (as defined below) will apply to any use of the Service (as defined below). If you click the button “Finish” upon

Add to Reading List

Source URL: 481xy61dp22v2uqbx85ez1twoe.wpengine.netdna-cdn.com

Language: English - Date: 2015-01-29 08:20:43
46Architecture of Windows NT / Computer architecture / Windows Vista / Kernel / Privilege escalation / Inter-process communication / Local Procedure Call / Computing

Windows privilege escalation Thomas Garnier SkyRecon Systems Recon 2008 – [removed]

Add to Reading List

Source URL: recon.cx

Language: English - Date: 2012-07-03 00:00:57
47Android / Embedded Linux / Smartphones / Mandatory access control / Dalvik / Sandbox / Linux kernel / Privilege escalation / Operating system / Software / System software / Computing

The Case for Security Enhanced (SE) Android Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: events.linuxfoundation.org

Language: English - Date: 2012-02-16 19:38:59
48Computer network security / Software testing / BackTrack / KDE / Penetration test / Password / SQL injection / Privilege escalation / Metasploit Project / Computer security / Cyberwarfare / Computing

P a g e |1 BackTrack 5 tutorial: Part 3 – More on exploitation frameworks Karthik R, Contributor You can read the original story here, on SearchSecurity.in.

Add to Reading List

Source URL: media.techtarget.com

Language: English - Date: 2012-02-07 06:48:24
49Embedded Linux / Smartphones / National Security Agency / Security-Enhanced Linux / Mandatory access control / Android / Linux kernel / Motorola Droid / Privilege escalation / Software / Computing / Computer security

Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

Add to Reading List

Source URL: www.incose-cc.org

Language: English - Date: 2013-08-29 11:50:21
50Video game developers / Browser-based game websites / Installation software / GameHouse / Antivirus software / Privilege escalation / Installation / Vulnerability / Debian / Software / System software / Computer security

GameHouse RealArcade Installer Default Game Installation Directory Unsafe Permissions Privilege Escalation RBS­2013­[removed]­10­09

Add to Reading List

Source URL: www.riskbasedsecurity.com

Language: English - Date: 2013-10-13 05:03:07
UPDATE