Uncontrolled format string

Results: 53



#Item
11Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Uncontrolled format string / Stack overflow / Circular buffer / Malware / Computer virus / Software bugs / Computing / Software quality

10061872_blended_attacks_wp.qxp

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2004-07-12 15:53:15
12Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
13Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
14Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
15Software engineering / Stack buffer overflow / Buffer overflow / Address space layout randomization / PaX / Heap overflow / NX bit / Uncontrolled format string / Stack / Computing / Software bugs / Software quality

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:33
16Software testing / Year of birth missing / Security / Gary McGraw / software security / Attack patterns / John Viega / Uncontrolled format string / Greg Hoglund / Hacking / Computer security / Cyberwarfare

r7jk.ps

Add to Reading List

Source URL: www.swsec.com

Language: English - Date: 2010-09-21 12:05:16
17Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
18Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
19Software engineering / Buffer overflow / Stack buffer overflow / PaX / Address space layout randomization / Vulnerability / Memory safety / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
20Computer security / Buffer overflow / Vulnerability / Valgrind / Uncontrolled format string / Intrusion detection system / Cyberwarfare / Software bugs / Computing

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
UPDATE