Privilege escalation

Results: 82



#Item
51Central processing unit / Ring / Kernel / Hydra / Privilege escalation / Sandbox / Capability-based security / Operating system / Microkernel / System software / Computer architecture / Computer security

Towards a Theory of Application Compartmentalisation Robert N. M. Watson1 , Steven J. Murdoch1 , Khilan Gudka1 , Jonathan Anderson1 , Peter G. Neumann2 , and Ben Laurie3 1

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-06-18 12:39:15
52Windows NT / Hacking / Software testing / Vulnerability / Windows Server / Windows / ClickOnce / Privilege escalation / Address space layout randomization / Computing / Microsoft Windows / Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-10-16 17:16:04
53Cyberwarfare / Hacking / Software testing / Vulnerability / Windows / Privilege escalation / Arbitrary code execution / Pwnie Awards / Przemysław Frasunek / Microsoft Windows / Windows NT / Computer security

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-10-16 17:15:58
54FTP clients / Internet Explorer / Windows XP / News aggregators / Software testing / Vulnerability / Internet Explorer 6 / Privilege escalation / Computer security / Microsoft Windows / Software / Computing

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-11-12 18:22:48
55Hacking / Software testing / Blog software / Drupal / Vulnerability / SQL injection / Privilege escalation / Arbitrary code execution / Exploit / Software / Computer security / Cyberwarfare

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-10-16 17:29:35
56FTP clients / Software testing / Internet Explorer / Hacking / Vulnerability / Internet Explorer 6 / Privilege escalation / Pwnie Awards / Przemysław Frasunek / Software / Computer security / Computing

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-10-16 17:15:36
57Crime / National security / Computer security / Phishing / Social engineering / Spamming / Malware / Threat / Identity theft / Security / Computer network security / Computer crimes

Password cracking, key logging, encryption, steganography, privilege escalation, and account masquerading •

Add to Reading List

Source URL: www.dss.mil

Language: English - Date: 2014-10-31 12:57:00
58Multi-touch / Smartphones / IOS / ITunes / Mobile device management / IPad / Mobile application development / Rooting / Privilege escalation / Computing / Software / Electronics

Risk Management for iPads

Add to Reading List

Source URL: www.cse-cst.gc.ca

Language: English - Date: 2014-12-10 06:04:19
59FTP clients / Internet Explorer / News aggregators / Windows Vista / Mandatory Integrity Control / Windows XP / User Account Control / Mandatory access control / Privilege escalation / Microsoft Windows / Software / Computing

WHITE PAPER Security Solutions Escaping from Microsoft’s Protected Mode Internet Explorer

Add to Reading List

Source URL: www.verizonenterprise.com

Language: English - Date: 2010-12-01 19:00:00
60Computing / Hacking / CVSS / Vulnerability / Rootkit / Privilege escalation / Arbitrary code execution / Superuser / Patch / Computer security / Cyberwarfare / Computer network security

INFORMATION SECURITY GUIDELINE Severity Ratings for Vulnerabilities (CVSS v2.0) Introduction 1. The purpose of this guideline is to summarize the standardized ratings, in the latest version of the Common Vulnerability Sc

Add to Reading List

Source URL: cio.ubc.ca

Language: English - Date: 2014-08-15 18:00:44
UPDATE