 
      
    | You are here | x0rb3l.github.io | ||
| | | | | syprog.blogspot.com | |
| | | | | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ... | |
| | | | | michaelneuper.com | |
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | | www.welivesecurity.com | |
| | | | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | |
| | | | | www.stevenhicks.me | |
| | | Did you know your blog's syntax highlighter probably has support for highlighting code diffs? I didn't. | ||