<--- Back to Details
First PageDocument Content
Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare
Date: 2007-07-18 14:25:17
Computer security
Buffer overflow
Heap overflow
Circular buffer
Integer overflow
Vulnerability
Code injection
Pointer
Stack overflow
Computing
Software bugs
Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Download Document from Source Website

File Size: 136,15 KB

Share Document on Facebook

Similar Documents

Computing / Cryptography / Cryptographic software / E-commerce / Internet Standards / Internet protocols / Secure communication / Transport Layer Security / Snippet / Microsoft CryptoAPI / Public-key cryptography / Application programming interface

Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Felix Fischer, Konstantin B¨ottinger, Huang Xiao, Christian Stransky∗ , Yasemin Acar∗ , Michael Backes∗ , Sascha Fahl∗

DocID: 1xTEW - View Document

ask.scipy.org ● Stack Overflow clone for scientists using Python ●

DocID: 1uPlx - View Document

Learning to Mine Aligned Code and Natural Language Pairs from Stack Overflow Pengcheng Yin,∗ Bowen Deng,∗ Edgar Chen, Bogdan Vasilescu, Graham Neubig Carnegie Mellon University, USA {pcyin, bdeng1, edgarc, bogdanv, g

DocID: 1tSVf - View Document

Understanding Stack Overflow Code Fragments Christoph Treude School of Computer Science University of Adelaide Adelaide, SA, Australia

DocID: 1twFc - View Document

Knowledge Curation in a Developer Community: A Study of Stack Overflow and Mailing Lists by Carlos Arturo Gómez Teshima B.Sc., Universidad Icesi, Colombia, 2005 M.Sc., Universidad del Valle, Colombia, 2013

DocID: 1t5Vb - View Document