Examples of using Buffer overflow in English and their translations into Greek
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
This virus attacks the security controller Local Security Authority Subsystem Service as it had a buffer overflow vulnerability.
A heap buffer overflow existed in IOHIDFamily's handling of key-mapping properties.
In information security and programming, a buffer overflow, or buffer overrun,
What is known is that a specially crafted call can trigger a buffer overflow in WhatsApp, allowing hackers to take control of the application
A heap buffer overflow existed in launchd's handling of IPC messages.
The JavaScript then opens a websocket connection to the vulnerable cable modem and exploits a buffer overflow vulnerability in the spectrum analyzer,
arbitrary code execution Description: A buffer overflow existed in the handling of font files.
including a buffer overflow attack and an attempted connection to a Lenovo test server.”.
including a buffer overflow attack and an attempted connection to a Lenovo test server.”.
FaceTime: In this case,“A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution,” Apple said:“A buffer overflow issue was addressed with improved memory handling”.
with a long string of X symbols instead of N ones to trigger the buffer overflow.
A malicious application may be able to execute arbitrary code with system privileges Description: A buffer overflow existed in IOHIDFamily.
arbitrary code execution Description: A buffer overflow existed in libTIFF's handling of CCITT Group 4 encoded TIFF images.
arbitrary code execution Description: A buffer overflow existed in libTIFF's handling of CCITT Group 4 encoded TIFF images.
This update fixes buffer overflow issues in Wireless Manager.
Description: A buffer overflow was addressed with improved size validation.
Description: A buffer overflow was addressed through improved bounds checking.
Description: A buffer overflow was addressed with improved bounds checking.
We used a buffer overflow exploit, thank you very much.
Description: A buffer overflow was addressed with improved size validation.