Examples of using Buffer overflows in English and their translations into Swedish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
-
Political
Libmcrypt-- Buffer overflows and memory leak.
Loading malformed XML documents can cause buffer overflows in OpenOffice.
Steve Kemp discovered several buffer overflows in xbl, a game,
Spectre 1.1 uses speculative data stores to create speculative buffer overflows.
Locally exploitable buffer overflows in splitvt and jazip.
Francis Gabriel discovered heap-based buffer overflows in the ASN.
Aug 2002 DSA-148 hylafax- buffer overflows and format string vulnerabilities.
Still,“The silver lining is that the same coding patterns are vulnerable to speculative buffer overflows.
Steve Kemp discovered multiple buffer overflows in atari800, an Atari emulator.
Several buffer overflows have been discovered in the MPlayer movie player,
More remotely exploitable buffer overflows in micq, mysql, and tinyproxy.
A set of buffer overflows have been discovered in masqmail,
Adam Zabrocki discovered multiple buffer overflows in atari800, an Atari emulator.
Several buffer overflows have been discovered in cgiirc,
Marcus Meissner from SUSE has discovered several buffer overflows in the ImageMagick graphics library.
Multiple buffer overflows involving HTTP header
A new version of procmail has been released which fixes some new buffer overflows that were missed in version 3.13.
which allows the execution of arbitrary code through buffer overflows.
It was discovered that multiple buffer overflows could lead to the execution of arbitrary code.
port scanning, buffer overflows and much more.
Daniel Roethlisberger discovered two buffer overflows in the cm4040 driver for the Omnikey CardMan 4040 device.
C++, we go into more details regarding the exploitation of buffer overflows on the stack and on the heap.
Multiple memory safety errors and buffer overflows may lead to the execution of arbitrary code or denial of service.
other deficiencies such as buffer overflows.
Depending upon the application, this vulnerability can cause buffer overflows and could possibly be exploited to execute arbitrary code.
Two buffer overflows have been found in the GIF image parsing code of Tk,
The controlling and management daemon apcupsd for APC's Unbreakable Power Supplies is vulnerable to several buffer overflows and format string attacks.
This causes several buffer overflows in situations where cyrus-sasl2 itself requires the string to be null terminated which can lead to denial of service
daemons to cause harm when compromised(via buffer overflows or misconfigurations, for example).
If a vulnerable version of tcpdump attempted to examine a maliciously constructed packet, a number of buffer overflows could be exploited to crash tcpdump,