代码搜索:buffer

找到约 10,000 项符合「buffer」的源代码

代码结果 10,000
www.eeworm.com/read/473927/6824003

txt 2550.txt

Rule: -- Sid: 2550 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with Winamp's processing of a .XM file module name. -- Impact: A successful a
www.eeworm.com/read/473927/6824012

txt 3660.txt

Rule: -- Sid: 3660 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with BrightStor ARCserve Backup Universal Agent message processing. -- Impact
www.eeworm.com/read/473927/6824023

txt 2464.txt

Rule: alert ip any any -> any any (msg:"EXPLOIT EIGRP prefix length overflow attempt"; ip_proto:88; byte_test:1,>,32,44; reference:cve,CAN-2004-0176; reference:bugtraq,9952; classtype:attempted-admin;
www.eeworm.com/read/473927/6824037

txt 3067.txt

Rule: -- Sid: 3067 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with the several commands of an IMAP service. This event is concerned with data
www.eeworm.com/read/473927/6824137

txt 3133.txt

Rule: -- Sid: 3133 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with the processing of a Portable Network Graphics (PNG) file by the GD Graphic
www.eeworm.com/read/473927/6824176

txt 3457.txt

Rule: -- Sid: 3457 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with the Arkeia Client Backup server. -- Impact: A successful attack may cause
www.eeworm.com/read/473927/6824248

txt 3659.txt

Rule: -- Sid: 3659 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with BrightStor ARCserve Backup Universal Agent message processing. -- Impact
www.eeworm.com/read/473927/6824285

txt 3686.txt

Rule: -- Sid: 3686 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow associated with an Internet Explorer client reading a malicious rating descriptions file (
www.eeworm.com/read/473927/6824328

txt 1975.txt

Rule: -- Sid: 1976 -- Summary: This event is generated when an attempt is made to supply an excessively long argument to an FTP command possibly in an attempt to exploit a buffer overflow vulnerabil
www.eeworm.com/read/473927/6824387

txt 1974.txt

Rule: -- Sid: 1974 -- Summary: This event is generated when an attempt is made to exploit a buffer overflow vulnerability associated with CesarFTPD FTP server REST command. -- Impact: Remote acces