String Buffer

Results: 87



#Item
11Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
12C programming language / C++ / 3D graphics software / Arrays / C Standard Library / Printf format string / Circular buffer / Sizeof / Objective-C / Computer programming / Computing / Software engineering

3D Studio File Format (3ds). Autodesk Ltd. Document RevisionJanuary 1997 3D-Studio File Format (.3ds)

Add to Reading List

Source URL: hippo.nipax.cz

Language: English - Date: 2011-07-30 13:04:35
13Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
14Software bugs / Software testing / Automated theorem proving / Concolic testing / Buffer overflow / Symbolic execution / Arithmetic overflow / String / C / Software engineering / Computing / Computer programming

University of California Los Angeles Symbolic Execution Algorithms for Test Generation

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-11-23 07:14:40
15Computer programming / C Standard Library / Printf format string / Shellcode / Handle / Pointer / Circular buffer / Printf / C / Computing / Data types / Software engineering

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
16Object-oriented programming / Method / Java programming language / Data types / Cross-platform software / String Buffer / Object / Java / Constructor / Computing / Software engineering / Computer programming

Object Calisthenics 9 steps to better software design today, by Jeff Bay http://www.xpteam.com/jeff/writings/objectcalisthenics.rtf http://www.pragprog.com/titles/twa/thoughtworks-anthology We’ve all seen poorly writte

Add to Reading List

Source URL: www.cs.helsinki.fi

Language: English - Date: 2010-12-01 14:04:11
17Linguistics / Software engineering / Circular buffer / Wrap / String / Computing / Foobar / Len

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-10-14 14:39:50
18Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
19Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
20Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
UPDATE