Examples of using Buffer overflow in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
Buffer Overflow vulnerability in VIC media player.
Superior protection against buffer overflow, port scans and SYN floods.
This virus attacks the security controller Local Security Authority Subsystem Service as it had a buffer overflow vulnerability.
Description: A buffer overflow issue existed in IOHIDFamily.
MS00-094: Patch available for"Phone Book service buffer overflow" vulnerability.
Exploiting buffer overflow is a known security vulnerability.
According to Facebook's security advisory,the WhatsApp vulnerability stemmed from an extremely common type of bug known as a buffer overflow.
Description: A buffer overflow was addressed with improved bounds checking.
However, if a connecting computer has a namelonger than 64 characters, a stack buffer overflow occurs in the NetUSB service, resulting in memory corruption.
Description: A buffer overflow was addressed with improved bounds checking.
Impact: A malicious application may be able to elevate privileges Description: A buffer overflow issue was addressed with improved memory handling.
Description: A buffer overflow was addressed with improved size validation.
Type of issue- the type of vulnerability(e.g. according to OWASP,such as cross-site scripting, buffer overflow, SQL injection, etc.) and include a general description of the vulnerability.
Description: A buffer overflow issue was addressed with improved memory handling.
Impact: A malicious application may be able to execute arbitrary code with system privileges Description:A heap buffer overflow existed in IOHIDFamily's handling of key-mapping properties.
Description: A buffer overflow issue was addressed through improved memory handling.
Impact: A malicious application may be able to execute arbitrary code with system privileges Description:A heap buffer overflow existed in launchd's handling of log messages.
Description: A heap based buffer overflow issue existed in the DNS client library.
Lenovo, Microsoft and an independent researcher have discovered possible ways this program could be exploited by an attacker,including a buffer overflow attack and an attempted connection to a Lenovo test server.”.
Description: A heap buffer overflow existed in launchd's handling of log messages.
Available for: iPhone 4 and later, iPod touch(5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description:A heap buffer overflow existed in launchd's handling of IPC messages.
Exploiting the behaviour of a buffer overflow is a well-known security exploit.
Available for: iPhone 4s and later, iPod touch(5th generation) and later, iPad 2 and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination orarbitrary code execution Description: A buffer overflow existed in the handling of font files.
Description: A stack buffer overflow exists in FreeType's handling of CFF opcodes.
The first is a buffer overflow vulnerability, the second an integer overflow vulnerability and the last a memory corruption vulnerability.
Well, you compromise the car by a buffer overflow of vulnerability in the software, something like that.
Communications Buffer Overflow" displays for receive(or transmit) buffer overflow.
It didn't take long until the researcher found a buffer overflow vulnerability in the CGI script that handled the log-out process.
Description: A buffer overflow exists in FreeType's handling of TrueType font files.
What is known is that a specially crafted call can trigger a buffer overflow in WhatsApp, allowing hackers to take control of the application and execute arbitrary code in it.