Uncontrolled format string

Results: 53



#Item
41Cyberwarfare / Buffer overflow protection / Stack buffer overflow / Buffer overflow / PaX / Address space layout randomization / Circular buffer / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Breaking the memory secrecy assumption Raoul Strackx Yves Younan Pieter Philippaerts

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:14:43
42Computer security / Memory management / Buffer overflow protection / Buffer overflow / Memory safety / Stack buffer overflow / PaX / Uncontrolled format string / C dynamic memory allocation / Computing / Software bugs / Software engineering

Protecting global and static variables from buffer overflow attacks Yves Younan Frank Piessens Wouter Joosen

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-03-01 01:16:09
43Cyberwarfare / Buffer overflow protection / Buffer overflow / Vulnerability / PaX / Uncontrolled format string / Stack / C dynamic memory allocation / Shellcode / Software bugs / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-02-25 04:08:30
44Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Cross-site scripting / Secure coding / JavaScript / Cyberwarfare / Computing / Computer security

Secure Coding Guide Contents Introduction to Secure Coding Guide 7 At a Glance 7

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-03-11 00:58:28
45Security / Software testing / Hacking / Vulnerability / Cross-site scripting / Common Vulnerabilities and Exposures / Attack / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Technical article Wiley Handbook of Science and Technology for Homeland Security

Add to Reading List

Source URL: homes.cerias.purdue.edu

Language: English - Date: 2008-02-13 12:27:37
46Software bugs / C Standard Library / Uncontrolled format string / Printf format string / Buffer overflow / Vulnerability / String / C / Printf / Computing / Software engineering / Computer programming

Exploiting Format String Vulnerabilities scut / team teso September 1, 2001

Add to Reading List

Source URL: www.inf.fu-berlin.de

Language: English - Date: 2013-04-18 08:12:53
47Shellcode / Computing / Systems engineering / Uncontrolled format string / Software bugs / Software quality / Buffer overflow

Introduction Buffer Overflow Format Strings

Add to Reading List

Source URL: diuf.unifr.ch

Language: English - Date: 2007-01-25 09:13:10
48Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Secure coding / JavaScript / Defensive programming / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: developer.apple.com

Language: English
49C programming language / Cross-platform software / Procedural programming languages / C++ / C Standard Library / Printf format string / Uncontrolled format string / D / ALGOL 68 / Computing / Software engineering / Computer programming

PDF Document

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-04-08 13:37:49
50Computer security / Software bugs / Cross-platform software / Computer network security / Vulnerability / Fuzz testing / Buffer overflow / Uncontrolled format string / Application security / Software testing / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2010-06-01 06:30:28
UPDATE