Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
If the receive buffer overflows, then the received data is lost.
Indeed, the buffer overflow security hole is an example of the problems caused.
Buffer Overflows have been around since the first computers were invented.
This is what they're talking about when they say that a particular program has a buffer overflow susceptibility.
A buffer overflow is an attack that could be used by a cracker to get full system access.
The worm spread itself using a common type of vulnerability known as a buffer overflow.
A buffer overflow vulnerability is known to affect all version of Becky!
But he added that the workaround did not use a buffer overflow error.
Buffer overflow protection is implemented as a change to the compiler.
Furthermore, it was designed with an eye towards preventing buffer overflows.
Modifying a piece of running code is also used in certain attacks, such as buffer overflows.
The goal of buffer overflow protection is to detect this issue in the least intrusive way possible.
This can mitigate the effects of buffer overflows and other security vulnerabilities.
The most reliable way to avoid or prevent buffer overflows is to use automatic protection at the language level.
The earliest documented hostile exploitation of a buffer overflow was in 1988.
Mudge was responsible for early research into a type of security vulnerability known as the buffer overflow.
The security hole is caused by what is known as a "buffer overflow error."
One such standard industry problem is a software coding error referred to as a buffer overflow.
There have been several implementations of buffer overflow protection.
The warnings have almost exclusively involved "buffer overflow" attacks, a common software error.
To estimate the likelihood of a buffer overflow in a network, the time required for an accurate answer can be extremely large.
This project produced several papers and modules, including one on buffer overflow vulnerabilities.
This effectively prevents many security exploits, such as some kinds of buffer overflows.
The buffer overflow is one of the best known and most widespread classes of security flaw around.
This helps prevent certain exploits that store code via a buffer overflow, for example.