Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Arbitrary code execution

Index Arbitrary code execution

In computer security, "arbitrary code execution" is used to describe an attacker's ability to execute any command of the attacker's choice on a target machine or in a target process. [1]

23 relations: Assembly language, Branch (computer science), Code injection, Computer security, Data buffer, Exploit (computer security), Flappy Bird, Homebrew (video games), Kernel (operating system), Machine code, Malware, NX bit, Pong, Privilege escalation, Process (computing), Program counter, Random-access memory, Shellcode, Software bug, Super Mario World, Vulnerability (computing), WordPress, Zombie (computer science).

Assembly language

An assembly (or assembler) language, often abbreviated asm, is a low-level programming language, in which there is a very strong (but often not one-to-one) correspondence between the assembly program statements and the architecture's machine code instructions.

New!!: Arbitrary code execution and Assembly language · See more »

Branch (computer science)

A branch is an instruction in a computer program that can cause a computer to begin executing a different instruction sequence and thus deviate from its default behavior of executing instructions in order.

New!!: Arbitrary code execution and Branch (computer science) · See more »

Code injection

Code injection is the exploitation of a computer bug that is caused by processing invalid data.

New!!: Arbitrary code execution and Code injection · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Arbitrary code execution and Computer security · See more »

Data buffer

In computer science, a data buffer (or just buffer) is a region of a physical memory storage used to temporarily store data while it is being moved from one place to another.

New!!: Arbitrary code execution and Data buffer · See more »

Exploit (computer security)

An exploit (from the English verb to exploit, meaning "to use something to one’s own advantage") is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).

New!!: Arbitrary code execution and Exploit (computer security) · See more »

Flappy Bird

Flappy Bird is a mobile game developed by Vietnamese video game artist and programmer Dong Nguyen (Nguyễn Hà Đông), under his game development company dotGEARS.

New!!: Arbitrary code execution and Flappy Bird · See more »

Homebrew (video games)

Homebrew is a term frequently applied to video games or other software produced by consumers to target proprietary hardware platforms (usually with hardware restrictions) not typically user-programmable or that use proprietary storage methods.

New!!: Arbitrary code execution and Homebrew (video games) · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: Arbitrary code execution and Kernel (operating system) · See more »

Machine code

Machine code is a computer program written in machine language instructions that can be executed directly by a computer's central processing unit (CPU).

New!!: Arbitrary code execution and Machine code · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Arbitrary code execution and Malware · See more »

NX bit

The NX bit (no-execute) is a technology used in CPUs to segregate areas of memory for use by either storage of processor instructions (code) or for storage of data, a feature normally only found in Harvard architecture processors.

New!!: Arbitrary code execution and NX bit · See more »

Pong

Pong is one of the earliest arcade video games.

New!!: Arbitrary code execution and Pong · See more »

Privilege escalation

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

New!!: Arbitrary code execution and Privilege escalation · See more »

Process (computing)

In computing, a process is an instance of a computer program that is being executed.

New!!: Arbitrary code execution and Process (computing) · See more »

Program counter

The program counter (PC), commonly called the instruction pointer (IP) in Intel x86 and Itanium microprocessors, and sometimes called the instruction address register (IAR), the instruction counter, or just part of the instruction sequencer, is a processor register that indicates where a computer is in its program sequence.

New!!: Arbitrary code execution and Program counter · See more »

Random-access memory

Random-access memory (RAM) is a form of computer data storage that stores data and machine code currently being used.

New!!: Arbitrary code execution and Random-access memory · See more »

Shellcode

In hacking, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.

New!!: Arbitrary code execution and Shellcode · See more »

Software bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

New!!: Arbitrary code execution and Software bug · See more »

Super Mario World

Super Mario World is a 1990 side-scrolling platform game developed and published by Nintendo for the Super Nintendo Entertainment System (SNES).

New!!: Arbitrary code execution and Super Mario World · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Arbitrary code execution and Vulnerability (computing) · See more »

WordPress

WordPress is a free and open-source content management system (CMS) based on PHP and MySQL.

New!!: Arbitrary code execution and WordPress · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Arbitrary code execution and Zombie (computer science) · See more »

Redirects here:

Arbitrary code, Remote code execution.

References

[1] https://en.wikipedia.org/wiki/Arbitrary_code_execution

OutgoingIncoming
Hey! We are on Facebook now! »