Uncontrolled format string

Results: 53



#Item
1Computing / Software engineering / Computer programming / Type theory / Data types / Cross-platform software / Object-oriented programming languages / C standard library / Printf format string / Comparison of programming languages / Uncontrolled format string / Type system

A Format String Checker for Java Konstantin Weitz Siwakorn Srisakaokul University of Washington, USA

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-07-07 00:47:36
2Computer network security / Hacking / Code audit / Information technology audit / Vulnerability / Cross-site scripting / SQL injection / Web application security / Code injection / Uncontrolled format string / Application security / Computer security

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
3Computing / Software engineering / Software / Software bugs / Buffer overflow / Stack buffer overflow / Address space layout randomization / PaX / Uncontrolled format string / Pointer / Stack / Printf format string

String Oriented Programming Circumventing ASLR, DEP, and Other Guards Mathias Payer ETH Zurich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
4Computing / Computer security / Software / Software bugs / C standard library / Address space layout randomization / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Buffer overflow / PaX / Uncontrolled format string

String Oriented Programming: When ASLR is not Enough Mathias Payer Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
5Computing / Software bugs / Software engineering / Buffer overflow / Computer memory / Address space layout randomization / Stack / Pointer / Uncontrolled format string / Stack buffer overflow

String Oriented Programming Circumventing ASLR, DEP, and other Guards Mathias Payer, ETH Zürich

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
6Cyberwarfare / Code injection / Machine code / Return-oriented programming / Privilege escalation / Uncontrolled format string / Computer security / Virtualization

I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
7Computing / Software bugs / Software engineering / Computer programming / Buffer overflow / Stack buffer overflow / Stack / Uncontrolled format string / C dynamic memory allocation / C standard library / Pointer / Integer overflow

I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer () Department of Computer Science, ETH Zurich Abstract

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
8Computing / Software engineering / Computer programming / Subroutines / Software bugs / C standard library / Uncontrolled format string / Printf format string / C POSIX library / C / Variadic function / Printf

USENIX Association Proceedings of the 10th USENIX Security Symposium Washington, D.C., USA

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-01-02 16:50:24
9Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-09-13 16:51:18
10Software bugs / C POSIX library / Computer errors / Stack buffer overflow / Buffer overflow / Write / Stack / Uncontrolled format string / Sizeof / Computing / Software engineering / Computer programming

CS 161 Fall 2005 Computer Security

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2005-12-11 05:02:06
UPDATE