代码搜索:buffer
找到约 10,000 项符合「buffer」的源代码
代码结果 10,000
www.eeworm.com/read/473927/6824003
txt 2550.txt
Rule:
--
Sid:
2550
--
Summary:
This event is generated when an attempt is made to exploit a buffer overflow
associated with Winamp's processing of a .XM file module name.
--
Impact:
A successful a
www.eeworm.com/read/473927/6824012
txt 3660.txt
Rule:
--
Sid:
3660
--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow associated with BrightStor ARCserve Backup Universal Agent
message processing.
--
Impact
www.eeworm.com/read/473927/6824023
txt 2464.txt
Rule:
alert ip any any -> any any (msg:"EXPLOIT EIGRP prefix length overflow attempt";
ip_proto:88; byte_test:1,>,32,44; reference:cve,CAN-2004-0176;
reference:bugtraq,9952; classtype:attempted-admin;
www.eeworm.com/read/473927/6824037
txt 3067.txt
Rule:
--
Sid:
3067
--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow associated with the several commands of an IMAP service. This
event is concerned with data
www.eeworm.com/read/473927/6824137
txt 3133.txt
Rule:
--
Sid:
3133
--
Summary:
This event is generated when an attempt is made to exploit a buffer overflow
associated with the processing of a Portable Network Graphics (PNG) file by
the GD Graphic
www.eeworm.com/read/473927/6824176
txt 3457.txt
Rule:
--
Sid:
3457
--
Summary:
This event is generated when an attempt is made to exploit
a buffer overflow associated with the Arkeia Client Backup
server.
--
Impact:
A successful attack may cause
www.eeworm.com/read/473927/6824248
txt 3659.txt
Rule:
--
Sid:
3659
--
Summary:
This event is generated when an attempt is made to exploit a buffer
overflow associated with BrightStor ARCserve Backup Universal Agent
message processing.
--
Impact
www.eeworm.com/read/473927/6824285
txt 3686.txt
Rule:
--
Sid:
3686
--
Summary:
This event is generated when an attempt is made to exploit a
buffer overflow associated with an Internet Explorer client
reading a malicious rating descriptions file (
www.eeworm.com/read/473927/6824328
txt 1975.txt
Rule:
--
Sid:
1976
--
Summary:
This event is generated when an attempt is made to supply an excessively
long argument to an FTP command possibly in an attempt to exploit a buffer
overflow vulnerabil
www.eeworm.com/read/473927/6824387
txt 1974.txt
Rule:
--
Sid:
1974
--
Summary:
This event is generated when an attempt is made to exploit a buffer overflow vulnerability associated with CesarFTPD FTP server REST command.
--
Impact:
Remote acces