...
[Chen 2002] Chen, H., Wagner, D., & Dean, D.
Setuid Demystified USENIX Security Symposium, 2002.
Anchor |
---|
Christey 2005 | Christey 2005 |
[Christey 2005] Christey, Steven M. Format String Vulnerabilities in Perl Programs (Full Disclosure mailing list archives), 2005 .
[Corfield 1993] Corfield, Sean A. "
Making String Literals 'const'," November 1993.
...
[MIT 2004] MIT. "MIT krb5 Security Advisory 2004-002 (
hhttphttp://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt), 2004.
[MIT 2005] MIT. "
MIT krb5 Security Advisory 2005-003, 2005.
...