A Google security engineer studying an SSH connection to a host unexpectedly discovered a deeper, darker secret in the GNU C Library (glibc). Google later proved that a bug in this library could be ...
Sudo, a utility found in dozens of Unix-like operating systems, has received a patch for a potentially serious bug that allows unprivileged users to easily obtain unfettered root privileges on ...
A classic buffer overflow exploit has been discovered in the Android software development kit (SDK) that impacts all versions of the Android Debug Bridge on Linux x86_64. The exploit scenario involved ...
Even though the term "fileless malware" was only coined recently, fileless attacks have been around for more than three decades. You may have heard of the more well-known names, like buffer-overflow, ...
Some of the bugs allow remote code-execution. The open-source Virtual Network Computing (VNC) project, often found in industrial environments, is plagued with 37 different memory-corruption ...
An exploit for a flaw in censorware mandated by the Chinese government has been made publicly available for download on the internet. The buffer overflow flaw exists in the latest, patched version of ...
Snort can be buffer overflowed. About once a year, Snort gets a buffer overflow vulnerability. Any piece of additional software in a defense strategy has to be carefully considered (e.g. Snort, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results