Arbitrary code execution

Results: 45



#Item
31Risk / Hacking / Software testing / Vulnerability / Social vulnerability / CVSS / Attack / Exploit / Arbitrary code execution / Cyberwarfare / Computer security / Computer network security

Cyber Security Advisory ABB Doc Id: Date Lang.

Add to Reading List

Source URL: www05.abb.com

Language: English - Date: 2013-10-21 05:08:50
32Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Microsoft Silverlight / Arbitrary code execution / Zero-day attack / Cross-site scripting / Computer security / Cyberwarfare / Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-03-11 18:58:41
33Microsoft Windows / Hacking / Software testing / Vulnerability / Arbitrary code execution / Privilege escalation / Exploit / Windows / Ring / Computer security / Cyberwarfare / Computing

Security Advisory SA2011-008

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-10-08 17:27:27
34Hacking / Software testing / Vulnerability / Google Chrome / JavaScript / Firefox / Exploit / Arbitrary code execution / Computer security / Software / Computing / Computer network security

Security Advisory SA2013-092

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-11-15 19:25:33
35Hacking / Computer network security / Software testing / Vulnerability / Zero-day attack / Exploit / Apache HTTP Server / Arbitrary code execution / Patch / Cyberwarfare / Computer security / Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-04-25 17:37:18
36Security / Hacking / Software testing / Vulnerability / Arbitrary code execution / Exploit / Pwnie Awards / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-06-11 16:27:17
37Failure / Hacking / Vulnerability / Patch / Address space layout randomization / Social vulnerability / Arbitrary code execution / Computer security / Cyberwarfare / Software testing

Immunity White Paper A Bounds Check on the Microsoft Exploitability Index Bas Alberts, Senior Researcher, Immunity, Inc[removed]

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2009-01-13 10:48:07
38Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-19 10:25:58
39Software bugs / Shellcode / Buffer overflow / Malware / Software testing / Arbitrary code execution / Binary translation / QEMU / Code injection / Software / System software / Cyberwarfare

S HELL OS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill, {kzsnow, kri

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-06-09 13:31:36
40Software bugs / C Standard Library / Return-to-libc attack / Hacking / Software testing / Procedural programming languages / Return-oriented programming / Buffer overflow / Arbitrary code execution / Computing / Cyberwarfare / Computer security

App Store for Massive Scale Software Diversity

Add to Reading List

Source URL: www.marshallplan.at

Language: English - Date: 2012-12-12 21:32:39
UPDATE