Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Buffer overflow protection (view), Stack buffer overflow (view)

searching for Buffer overflow 78 found (254 total)

alternate case: buffer overflow

Sendmail (974 words) [view diff] case mismatch in snippet view article find links to article

US-CERT Alerts. Archived from the original on 2006-04-08. "CA-2003-25 Buffer Overflow in Sendmail". CERT Advisories. 31 December 2003. Archived from the
Christien Rioux (393 words) [view diff] case mismatch in snippet view article find links to article
administration tool. He is also well known as the author of "The Tao of Windows Buffer Overflow." "L0pht in Transition". April 2007. Archived from the original on
Welchia (400 words) [view diff] exact match in snippet view article find links to article
Microsoft Windows system code (TFTPD.EXE and TCP on ports 666–765, and a buffer overflow of the RPC on port 135). Its method of infection is to create a remote
Agobot (675 words) [view diff] case mismatch in snippet view article find links to article
DCOM Remote Buffer Overflow (CVE-2003-0352) MS04-011 LSASS Remote Buffer Overflow (CVE-2003-0533) MS05-039 Plug and Play Remote Buffer Overflow (CVE-2005-1983)
Virtual machine escape (1,141 words) [view diff] exact match in snippet view article find links to article
for VMware CVE-2008-1943 Xen Para Virtualized Frame Buffer backend buffer overflow. CVE-2009-1244 Cloudburst: VM display function in VMware CVE-2011-1751
Miniclip (1,324 words) [view diff] exact match in snippet view article find links to article
Miniclip: The Retro64 / Miniclip CR64 Loader ActiveX control contains a buffer overflow vulnerability. This may allow a remote, unauthenticated attacker to
Michał Zalewski (381 words) [view diff] case mismatch in snippet view article find links to article
January 24, 2012. "CA-2003-25 Buffer Overflow in Sendmail". CERT Advisories. Retrieved August 22, 2005. "CA-2003-12 Buffer Overflow in Sendmail". CERT Advisories
Spybot worm (313 words) [view diff] exact match in snippet view article find links to article
Earlier versions mostly used the RPC DCOM buffer overflow, although now some use the LSASS buffer overflow. The ability to spread via various common backdoor
Prevx (783 words) [view diff] exact match in snippet view article find links to article
its rules, thus providing protection. It offered protection against buffer overflow attacks and could successfully detect rootkits that attempted to hide
Code segment (335 words) [view diff] exact match in snippet view article find links to article
Yu-An Tan; Ji-yan Zheng; Yuan-Da Cao; Xue-lan Zhang (October 2005). Buffer overflow protection based on adjusting code segment limit. IEEE International
Android SDK (533 words) [view diff] exact match in snippet view article find links to article
Developers. "Glossary". Android Developers. Duckett, Chris. "Android SDK suffers from buffer overflow and lack of hardening". ZDNet. Retrieved 2021-08-05.
MaraDNS (512 words) [view diff] exact match in snippet view article find links to article
or authoritative nameserver. MaraDNS has a string library, which is buffer overflow resistant and has its own random number generator. While MaraDNS does
KWallet (2,649 words) [view diff] exact match in snippet view article find links to article
(1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow." "Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG
M3U (1,821 words) [view diff] exact match in snippet view article find links to article
buffer overflow in Apple iTunes before 10.6.3 allows remote attackers to execute arbitrary commands". cve.circl.lu. "CVE-2000-0624: Buffer overflow in
Itzik Kotler (956 words) [view diff] case mismatch in snippet view article find links to article
the 22nd Chaos Communication Congress. His presentation "Advanced Buffer Overflow Methods" was used in various academic papers and conferences. Additional
Fork bomb (810 words) [view diff] exact match in snippet view article find links to article
via YouTube. Michal Zalewski (August 19, 1999). "[RHSA-1999:028-01] Buffer overflow in libtermcap tgetent()". Newsgroup: muc.lists.bugtraq. Retrieved December
2011 Grand Prix motorcycle racing season (4,507 words) [view diff] case mismatch in snippet view article find links to article
GPone. Buffer Overflow S.r.l. 6 February 2011. Retrieved 22 February 2011. "Rossi signs for Matteoni, but it's Louis". GPone. Buffer Overflow S.r.l. 15
Control-C (499 words) [view diff] case mismatch in snippet view article find links to article
Ctrl+v for Paste?". control+C and control+V to do ... copy and paste "A Buffer Overflow Exploit Against the DameWare Remote Control software". December 19
Sam Curry (626 words) [view diff] case mismatch in snippet view article find links to article
Retrieved April 9, 2021. "Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty". samcurry.net. Retrieved November 3, 2019. "Web
David Litchfield (418 words) [view diff] exact match in snippet view article find links to article
Briefings in July 2002 he presented some exploit code to demonstrate a buffer overflow vulnerability he had discovered in Microsoft's SQL Server 2000. Then
Placement syntax (2,719 words) [view diff] exact match in snippet view article find links to article
demonstrated some of the exploits on placement new. Some of the attacks are buffer overflow attacks, object overflow, selective stackguard overriding, virtual
Fnord (1,231 words) [view diff] case mismatch in snippet view article find links to article
Penguin Books. ISBN 978-0-14-191690-3. Jason Deckard (29 January 2005). Buffer Overflow Attacks: Detect, Exploit, Prevent. Syngress. p. 283. ISBN 978-0-08-048842-4
Arithmetic underflow (801 words) [view diff] exact match in snippet view article find links to article
Overflow/Underflow and Floating Point Imprecision". Medium. "Integer underflow and buffer overflow processing MP4 metadata in libstagefright". Mozilla. "Avoiding Buffer
Common Weakness Enumeration (487 words) [view diff] case mismatch in snippet view article find links to article
and Vulnerabilities". samate.nist.gov. "CWE - CWE-121: Stack-based Buffer Overflow (4.15)". cwe.mitre.org. Retrieved August 5, 2024. "CWE - CWE-Compatible
Przemysław Frasunek (337 words) [view diff] exact match in snippet view article find links to article
exploits for the format string bug class of attacks. CVE-2001-0414, Buffer overflow (remote root exploit) in NTP server, affecting wide range of systems
C11 (C standard revision) (1,049 words) [view diff] exact match in snippet view article
New Standard". Dr. Dobb's Journal. Safe C API—Concise solution of buffer overflow, The OWASP Foundation, OWASP AppSec, Beijing 2011 C Language Working
Triple fault (549 words) [view diff] exact match in snippet view article find links to article
modern operating systems, a triple fault is typically caused by a buffer overflow or underflow in a device driver which writes over the interrupt descriptor
Alexander Sotirov (372 words) [view diff] exact match in snippet view article find links to article
"Vulnerability Note VU#191609: Microsoft Windows animated cursor stack buffer overflow". United States Computer Emergency Readiness Team. 2007-03-29. Archived
ImmuniWeb (992 words) [view diff] exact match in snippet view article find links to article
messages". "Is Facebook spying on you?". CNBC. Brook, Chris. "PHP patches buffer overflow vulnerabilities". threatpost. Retrieved 27 October 2014. Fox-Brewster
Speed Up (559 words) [view diff] case mismatch in snippet view article find links to article
Iannone" [SpeedMaster and SpeedUp with Iannone]. GpOne.com (in Italian). Buffer Overflow srl. Retrieved 27 March 2015. Zunino, Serena (12 March 2021). "Moto2
Metasploit (1,622 words) [view diff] exact match in snippet view article find links to article
Vincent Liu, chapter 12 explains how to use Metasploit to develop a buffer overflow exploit from scratch. Wikimedia Commons has media related to Metasploit
QuickTime (7,720 words) [view diff] exact match in snippet view article find links to article
QuickTime 7.4.1 resolved this issue. Versions 4.0 through 7.3 contained a buffer overflow bug which could compromise the security of a PC using either the QuickTime
Alessandro Zaccone (589 words) [view diff] case mismatch in snippet view article find links to article
2016). "SBK, Bassani e Zaccone in SSP con il Team Italia". gpone.com. Buffer Overflow S.r.l. Adriano Bestetti (24 December 2016). "Alessandro Zaccone in
Qualys (1,077 words) [view diff] exact match in snippet view article find links to article
Winners 2021 – Pwnies". pwnies.com. Retrieved 2022-04-29. "Heap-based buffer overflow in Sudo! – Pwnies". pwnies.com. Retrieved 2022-04-29. "21 Nails – Pwnies"
UNIVAC 418 (776 words) [view diff] exact match in snippet view article find links to article
continuously high-speed serial character streams. One was called the buffer overflow interrupt and the other hardware buffer chaining. By the 1990s, all
Honeywell 200 (1,402 words) [view diff] exact match in snippet view article find links to article
mark could be placed at the end of an input buffer to prevent any buffer overflow, a problem that was to persist in many other systems into the 21st
OpenSSH (2,781 words) [view diff] exact match in snippet view article find links to article
vulnerability are CVE-2016-0777 (information leak) and CVE-2016-0778 (buffer overflow). On March 29, 2024, a serious supply chain attack on XZ Utils has
Benjamin Kunz Mejri (1,925 words) [view diff] exact match in snippet view article find links to article
Security Response Center released a critical vulnerability in Skype. A buffer overflow during the Remote Desktop Protocol (RDP) clipboard transmission allowed
Marc Thomas (computer scientist) (359 words) [view diff] case mismatch in snippet view article
2017. Remarks on Network Security Typical Hacking Attempts Typical Buffer Overflow Hack Attempts Moronic Hacking Efficient Hacking Elements in the radical
Infinite loop (2,605 words) [view diff] case mismatch in snippet view article find links to article
from the original on 9 August 2020. Retrieved 22 January 2020. "A Buffer Overflow Exploit Against the DameWare Remote Control software". December 19
Software Guard Extensions (2,135 words) [view diff] exact match in snippet view article find links to article
attack, disclosed in August 2018, combines speculative execution and buffer overflow to bypass the SGX. A security advisory and mitigation for this attack
Internet Information Services (3,633 words) [view diff] case mismatch in snippet view article find links to article
Survey". news.netcraft.com. Netcraft. 27 February 2017. "CA-2001-13 Buffer Overflow In IIS Indexing Service DLL". CERT® Advisory. Computer emergency response
MicroMUSE (943 words) [view diff] no match in snippet view article find links to article
exploiting poorly written routines. Generally, these would either cause a buffer-overflow, or would cause an infinite loop. The attacks were usually carried
NTLDR (3,021 words) [view diff] exact match in snippet view article find links to article
This can be useful for preventing malicious code from exploiting buffer overflow bugs with unexpected program input in order to execute arbitrary code
KSMBD (716 words) [view diff] exact match in snippet view article find links to article
DCE/RPC management that has historically resulted into number of buffer overflow issues and dangerous security bugs and winreg and user account management
Intrusion Detection Message Exchange Format (1,085 words) [view diff] exact match in snippet view article find links to article
Grouping tool OverflowAlert: Alert resulting from attack so-called buffer overflow IDMEF report of ping of death attack can look as follows: <?xml version="1
Shoup Voting Machine Corporation (1,099 words) [view diff] exact match in snippet view article find links to article
of Windows XP Embedded from 2002 that were vulnerable to a critical buffer overflow attack. In July 1971, United States Attorney General John N. Mitchell
2012 Moto2 World Championship (1,594 words) [view diff] case mismatch in snippet view article find links to article
[Corti and Nakagami in 2012 with Italtrans]. gpone.com (in Italian). Buffer Overflow Ltd. Archived from the original on 7 November 2011. Retrieved 5 November
OpenBSD (8,724 words) [view diff] exact match in snippet view article find links to article
the original on 6 January 2012. "OpenBSD's IPv6 mbufs remote kernel buffer overflow". Core Security Technologies. 13 March 2007. Archived from the original
Blended threat (1,904 words) [view diff] no match in snippet view article find links to article
Eric, Péter (2002). "Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses" (PDF). Virus Bulletin: 35. Archived
Zvi Lotker (741 words) [view diff] exact match in snippet view article find links to article
Mansour, Y., Patt-Shamir, B., Schieber, B., & Sviridenko, M. (2004). Buffer overflow management in QoS switches. SIAM Journal on Computing, 33(3), 563–583
Nintendo 3DS system software (4,154 words) [view diff] exact match in snippet view article find links to article
Nintendo DSi Sound. A security bug in Nintendo 3DS Sound allowed a buffer overflow and, eventually, arbitrary code execution. Nintendo patched out the
NOP (code) (2,313 words) [view diff] exact match in snippet view article
exact value of the instruction pointer is indeterminate (e.g., when a buffer overflow causes a function's return address on the stack to be overwritten)
Maverick Viñales (3,170 words) [view diff] case mismatch in snippet view article find links to article
Margaria, Alice (1 May 2011). "Terol walks to Estoril win". GPone. Buffer Overflow srl. Retrieved 17 May 2011. Cambio, Tom (15 May 2011). "Viñales snatches
NOP (code) (2,313 words) [view diff] exact match in snippet view article
exact value of the instruction pointer is indeterminate (e.g., when a buffer overflow causes a function's return address on the stack to be overwritten)
Maverick Viñales (3,170 words) [view diff] case mismatch in snippet view article find links to article
Margaria, Alice (1 May 2011). "Terol walks to Estoril win". GPone. Buffer Overflow srl. Retrieved 17 May 2011. Cambio, Tom (15 May 2011). "Viñales snatches
Andrea Iannone (2,744 words) [view diff] case mismatch in snippet view article find links to article
Alice (5 November 2011). "Iannone to test the Gresini Honda". GPOne. Buffer Overflow srl. Archived from the original on 8 November 2011. Retrieved 6 November
Criticism of Windows Vista (5,197 words) [view diff] exact match in snippet view article find links to article
randomization (ASLR). The result of this is that any already existing buffer overflow bugs that, in Vista, were previously not exploitable due to such features
Intrusion detection system (5,513 words) [view diff] exact match in snippet view article find links to article
Internet Message Access Protocol (IMAP) server may be vulnerable to a buffer overflow, and an IDS is able to detect the attack signature of 10 common attack
Magic number (programming) (4,659 words) [view diff] exact match in snippet view article
a debugger or memory dump most likely indicates an error such as a buffer overflow or an uninitialized variable. Famous and common examples include: Most
2015 Moto3 World Championship (2,356 words) [view diff] case mismatch in snippet view article find links to article
[Moto3, Bezzecchi in Qatar instead of Manzi]. GPone (in Italian). Buffer Overflow srl. 3 March 2015. Retrieved 3 March 2015. "Darryn Binder and Tonucci
2021 Moto3 World Championship (2,570 words) [view diff] case mismatch in snippet view article find links to article
Lopez against Biaggi: "Left stranded with a signed contract"". GPone. Buffer Overflow srl. 6 January 2020. Retrieved 6 January 2020. "Adrian Fernandez joins
Intel Management Engine (4,428 words) [view diff] exact match in snippet view article find links to article
server chipsets". The Register. "Intel Management Engine pwned by buffer overflow". TheRegister.com. "INTEL-SA-00112". Intel. "INTEL-SA-00125". Intel
ERP security (1,649 words) [view diff] exact match in snippet view article find links to article
vulnerabilities (XSS, XSRF, SQL Injection, Response Splitting, Code Execution) Buffer overflow and format string in web-servers and application-servers (SAP IGS,
MSN Messenger (8,074 words) [view diff] exact match in snippet view article find links to article
in any later versions of the software. AOL did this by exploiting a buffer overflow bug in AIM, which causes it to execute a bit of machine code sent by
Intel vPro (4,373 words) [view diff] exact match in snippet view article find links to article
bit that, when supported by the OS, can help prevent some types of buffer overflow attacks. The 12th generation of Intel Core processors introduced four
Athlon 64 (5,383 words) [view diff] exact match in snippet view article find links to article
and higher is also included, for improved protection from malicious buffer overflow security threats. Hardware-set permission levels make it much more
Alisa Esage (1,769 words) [view diff] exact match in snippet view article find links to article
nsScriptableUnicodeConverter::ConvertFromByteArray can cause a heap buffer overflow". bugzilla.mozilla.org. Retrieved 5 March 2021. "825503 - chromium
VMware Workstation (2,884 words) [view diff] exact match in snippet view article find links to article
addresses the following issues: VMware Workstation Pro has a heap buffer overflow and uninitialized stack memory usage in SVGA. These issues might allow
Client honeypot (2,601 words) [view diff] exact match in snippet view article find links to article
instructions are executed in data area of memory (which would indicate a buffer overflow exploit has been triggered). With such an approach, SHELIA is not only
Microsoft Data Access Components (6,862 words) [view diff] exact match in snippet view article find links to article
broadcast by clients with a specially crafted packet that could cause a buffer overflow. Another flaw was found whereby code could be executed remotely when
List of Ghost in the Shell: SAC 2045 episodes (296 words) [view diff] exact match in snippet view article find links to article
However, the supposedly brain-dead Gary uses coded messages to perform a buffer overflow attack on the facility's emergency systems, taking control of the security
Spectre (security vulnerability) (7,089 words) [view diff] case mismatch in snippet view article
Jürgen (2018-07-11). "Spectre-NG: Intel dokumentiert 'spekulativen Buffer Overflow'". Heise Security (in German). Archived from the original on 2018-07-15
Transport Layer Security (17,517 words) [view diff] exact match in snippet view article find links to article
by a single mistyped character in code used to parse HTML created a buffer overflow error on Cloudflare servers. Similar in its effects to the Heartbleed
Data center security (2,702 words) [view diff] exact match in snippet view article find links to article
makes the target believe it is communicating with the trusted host. Buffer overflow attacks: When a program allocates memory buffer space beyond what it
Mobile security (11,017 words) [view diff] exact match in snippet view article find links to article
browser. In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser (LibTIFF). A similar vulnerability
UniPro protocol stack (4,180 words) [view diff] exact match in snippet view article find links to article
receiver to pause the transmitter if needed, thus avoiding receive buffer overflow. Control frames are unaffected by L2 flow control: they can be sent
Pwn2Own (7,793 words) [view diff] case mismatch in snippet view article find links to article
Retrieved 2023-06-12. "Zero Day Initiative — CVE-2022-29844: A Classic Buffer Overflow on the Western Digital My Cloud Pro Series PR4100". Zero Day Initiative