Software bugs

Results: 1223



#Item
911Phyla / Protostome / Home / Bed bug / Mattresses / Bed / Bat bug / Bug / Software bug / Hemiptera / Parasites / Bedding

Bed Bugs Recognition and Management WA S H I N G T O N S TAT E U N I V E R S I T Y E X T E N S I O N FA C T S H E E T • F S[removed]E Purpose

Add to Reading List

Source URL: cru.cahe.wsu.edu

Language: English - Date: 2012-04-16 10:26:04
912Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
913Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
914Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
915Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
916Software bugs / Software testing / Directory traversal attack / Improper input validation / Canonicalization / UTF-8 / Pointer / Buffer overflow / File system / Computing / Cyberwarfare / Computer security

[removed]Other Intentional, Nonmalicious Weakness

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
917Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2013-05-28 17:28:59
918Protostome / Parasites / Pest control / Biology / Bed bug / Bed / Software bug / Bug / Integrated pest management / Hemiptera / Beds / Phyla

What Do Bed Bugs Look Like?  Adults are rusty red, and apple seed sized, 3/8”, with six legs, oval, and flattened from top to bottom.  They do not jump or fly, but are good runners and hitch hikers.

Add to Reading List

Source URL: njaes.rutgers.edu

Language: English - Date: 2013-03-18 09:21:00
919Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
920Password / Improper input validation / Directory traversal attack / Buffer overflow / Canonicalization / Authorization / File system / Access control / Uniform resource locator / Computing / Software bugs / Computer security

[removed]Not Using a Random IV with CBC Mode 331 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
UPDATE