New: bufferoverflowAll contenthive-129948hive-196917krsteemzzanhive-183959hive-180932hive-166405photographyuncommonlabhive-185836hive-144064hive-183397hive-150122bitcoinlifehive-188619krsuccesshive-101145hive-124908hive-103599hive-139150hive-184714hive-106183hive-103393TrendingNewHotLikerstwr (53)in bufferoverflow • 5 years agoVM Escape Vulnerability Discovered In QEMU (Quick Emulator) Which Allowed For Code ExecutionReportedly, a VM escape vulnerability exists in QEMU – an open source hardware virtualization emulator. The flaw, upon exploit, could allow an attacker to attack the host QEMU process resulting in a…twr (53)in bufferoverflow • 5 years agoMozilla Rolled-Out Multiple Security Fixes With Thunderbird 60.7.1It hasn’t been long since Mozilla last released updates for its Thunderbird email client however yet again, they've needed to add security fixes with the program. Therefore, they now have rolled out…twr (53)in arbitrarycodeexecution • 6 years agoThreadX WiFi Firmware Vulnerability Affects Smartphones, Laptops, Gaming Devices, and RoutersA researcher has found several security vulnerabilities in ThreadX WiFi firmware. He discovered these vulnerabilities in the firmware running on Marvell Avastar 88W8897 wireless chipset. This…twr (53)in arbitrarycodeexecution • 6 years agoAnother Zero-Day Vulnerability Hits NUUO Surveillance CamerasA couple of months ago, a zero-day vulnerability, named Peekaboo, threatened NUUO surveillance cameras. The vulnerability could allow an attacker to take control of the cameras and execute arbitrary…security101 (53)in deutsch • 7 years ago[DE] Bufferoverflow - PraxisbeispielVorallem eingebettete Systeme nutzen oftmals Hardwarenahe Programmiersprachen und sind damit anfällig für Buffer-Overflows. Nachdem ich in einem vorherigen Beitrag die theoretische Funktionsweise…security101 (53)in utopian-io • 7 years agoexploiting firmware binarys using a bufferoverflow - a practical tutorialWhat Will I Learn? You will learn : How to extract a filesystem of a firmware How to run binarys for another architecture using qemu How a bufferoverflow works on a simple example…security101 (53)in it-security • 7 years ago[EN] Bufferoverflow - Theoretical partIn a buffer overflow or buffer overflow, data that is often read in as user input is written to a memory area that was not intended for this purpose. As larger amounts of data are read in than…security101 (53)in deutsch • 7 years ago[DE] Bufferoverflow - Die TheorieBei einem Bufferoverflow oder Pufferüberlauf werden Daten, die oftmals als Benutzereingaben eingelesen werden, in einen Speicherbereich geschrieben, der nicht dafür gedacht war. Indem größere…slawas (35)in hacking • 7 years agohacking: 3.Buffer overflow attacksHi, Today We will to talk about buffer overflow attacks.That attacks consists at to used bugs not users but software developers. We will to find out can use hacker and how to can warn as…dana-edwards (74)in security • 8 years agoWeird machines - unexpected behavior from unexpected (crafted) inputsWeird machines - unexpected behavior from unexpected (crafted) inputs To understand how exploits such as what happened with TheDAO and future exploits upcoming we have to understand the concept…