Exemplos de uso de Buffer overflow em Inglês e suas traduções para o Português
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Official/political
Gzip-- Potential buffer overflow.
Xtell-- Buffer overflow and other problems.
Be careful with buffer overflows!
Buffer Overflow detection and variable re….
Wget-- Directory traversal, buffer overflow.
Canna-- Buffer overflow and denial of service.
Libgtop-- Format string vulnerability and buffer overflow.
OpenLDAP2-- Buffer overflows and other problems.
That were discarded because the input buffer overflowed.
Fsp-- Buffer overflow, directory traversal.
Libsafe-- Protection against buffer overflow vulnerabilities.
MySQL-- Buffer overflow. New or Noteworthy Packages.
Now we are going to examine a few rules to prevent buffer overflows.
Balsa-- Buffer overflow. New or Noteworthy Packages.
The use of the snprintf()function is to prevent from buffer overflows.
Man-db-- Buffer overflows, arbitrary command execution.
Avoiding security holes when developing an application- Part 3: buffer overflows.
Hylafax-- Buffer overflows and format string vulnerabilities.
This article explains how to exploit badly programmed software by using buffer overflows.
Libsafe-- Protection against buffer overflow vulnerabilities Bug 348230.
Bug fixing: Limitation in length of all parameters to avoid buffer overflow.
Aug 2002 DSA-148 hylafax- buffer overflows and format string vulnerabilities.
Buffer overflow relies on the stack content overwriting a variable and changing the return address of a function.
A heap overflow or heap overrun is a type of buffer overflow that occurs in the heap data area.
Even though this application doesn't need to run with special permissions,during its development special care was taken with the strict validation of buffers in order to prevent any buffer overflow attacks.
Ubuntu compiles its packages using GCC features such as PIE and buffer overflow protection to harden its software.
This helps to prevent certain buffer overflow exploits from succeeding, particularly those that inject and execute code, such as the Sasser and Blaster worms.
Dat IF a URL for a visited site is long enough it will cause a buffer overflow and denial of service.
Over and over,you can see they used buffer overflow, path name, and SQL injection attacks to exploit vulnerabilities in e-mail servers.
Even though these applications don't need to run with special permissions,during their development special care was taken with the strict validation of buffers in order to prevent any buffer overflow attacks.