Secure coding: Revision history


For any version listed below, click on its date to view it. For more help, see Help:Page history and Help:Edit summary. (cur) = difference from current version, (prev) = difference from preceding version, m = minor edit, → = section edit, ← = automatic edit summary

(newest | oldest) View ( | older 50) (20 | 50 | 100 | 250 | 500)

27 October 2018

27 August 2018

29 June 2018

3 March 2018

24 November 2017

21 October 2017

23 September 2017

28 April 2017

10 February 2017

7 February 2017

2 February 2017

  • curprev 09:2309:23, 2 February 2017 46.226.49.230 talk 4,996 bytes +6 There was a fault in the first example which used strcpy(dst, user_input); instead of strcpy(dst, large_user_input); when the vulnerable_function was taking large_user_input as an argument. undo

26 December 2016

15 December 2016

8 December 2016

24 July 2014

24 March 2014

20 May 2013

18 March 2013

14 February 2013

16 July 2012

12 May 2012

9 March 2012

25 January 2011

16 September 2010

22 July 2010

4 September 2009

1 September 2009

11 April 2009

25 March 2009

28 October 2008

11 June 2008

16 May 2008

6 May 2008

27 March 2008

27 February 2008

  • curprev 01:1301:13, 27 February 2008 Manionc talk contribs 596 bytes +596 Created page with 'History has proven that software defects, bugs and logic flaws are consistently the primary cause of commonly exploited software vulnerabilities. Through the analys...'
(newest | oldest) View ( | older 50) (20 | 50 | 100 | 250 | 500)