Security bug

Results: 244



#Item
11Security / Computing / Computer security / Prevention / Cyberwarfare / Computer network security / Cryptography / National security / Bug bounty program / Vulnerability / Lavasoft / Application security

EVAN RICAFORT Address: Prk. Orchids, Poblacion, Ipil Zamboanga Sibugay, Zamboanga Del Sur 7000 | Email: | Mobile: + | Website: www.evanricafort.com SUMMARY

Add to Reading List

Source URL: evanricafort.com

Language: English - Date: 2016-01-21 13:11:11
12

Network Time Foundation Accomplishments 2015 Technical Milestones 4 stable releases of NTP, addressing 20 security issues, 100+ bug fixes and 150+ improvements -- Released ntp-4.2.8p1 in February -- Released ntp-4.2.8p2

Add to Reading List

Source URL: nwtime.org

Language: English - Date: 2016-02-05 17:14:22
    13Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Internet security / Cyber-Insurance / Vulnerability / CERT Coordination Center / Zero-day / Bug bounty program / Attack

    A Comparison of Market Approaches to Software Vulnerability Disclosure Rainer B¨ ohme Technische Universit¨ at Dresden

    Add to Reading List

    Source URL: www.is.uni-muenster.de

    Language: English - Date: 2012-12-21 05:49:44
    14Software / Free software / Software bug / Bug tracking system / Bug / Debugging / Software testing / Linux kernel / Internet security

    When Would This Bug Get Reported? Ferdian Thung1, David Lo1 , Lingxiao Jiang1 , Lucia1 , Foyzur Rahman2 , and Premkumar T. Devanbu2 1 Singapore Management University, Singapore 2 University of California, Davis, USA

    Add to Reading List

    Source URL: macbeth.cs.ucdavis.edu

    Language: English - Date: 2012-11-07 15:16:26
    15Cryptographic software / Internet security / Object-oriented programming languages / OpenSSL / Data types / Subroutines / Coccinelle / D / Software bug / Scope / Relational operator / Printf format string

    Finding Error Handling Bugs in OpenSSL using Coccinelle Julia Lawall∗ , Ben Laurie† , Ren´e Rydhof Hansen‡ , Nicolas Palix∗ and Gilles Muller§ ∗ University of Copenhagen, Email: {julia,npalix}@diku.dk † Goo

    Add to Reading List

    Source URL: coccinelle.lip6.fr

    Language: English - Date: 2012-01-04 11:08:48
    16FreeBSD / Qmail / Privilege escalation / Computer security / Berkeley Software Distribution / Kernel / Exploit / Linux kernel / Software bug

    What is a Security Flaw? Colin Percival Colin Percival

    Add to Reading List

    Source URL: www.daemonology.net

    Language: English - Date: 2006-05-14 06:23:45
    17Computing / Internet / Software / Internet security / Tor / Cryptographic software / The Tor Project /  Inc / Software bug / OpenSSL

    From: Andrew Lewman, Executive Director To: The Tor Community Date: January 14, 2012 This report documents progress in December 2011.

    Add to Reading List

    Source URL: archive.torproject.org

    Language: English - Date: 2012-01-14 15:24:13
    18Computability theory / Theory of computation / Models of computation / Turing machine / Markup languages / Parsing / Halting problem / Software bug / Programming language / Theoretical computer science / Computer science / Computing

    SYSTEMS SECURITY Editors: Patrick McDaniel, | Sean W. Smith, Beyond Planted Bugs in “Trusting Trust” The Input-Processing Frontier Sergey Bratus, Trey Darley, Michael Locasto

    Add to Reading List

    Source URL: langsec.org

    Language: English - Date: 2014-04-02 21:43:44
    19Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

    A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:13
    20Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

    Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

    Add to Reading List

    Source URL: naveen.ksastry.com

    Language: English - Date: 2013-06-08 15:25:46
    UPDATE