buffer-overflow

9 articles
Sort: New Top Best
clear filter
0
cis.syr.edu · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
blog.rapid7.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
blog.usejournal.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

This article explains how buffer overflow vulnerabilities work, demonstrating how attackers craft malicious input to overwrite stack memory, particularly return addresses, to execute arbitrary code. It covers the mechanics of stack buffer overflows, practical examples in C, and discusses modern OS-level and compiler-based prevention techniques like DEP, ASLR, and stack canaries.

Invicti Piotr Sobolewski StackGuard Linux Microsoft Windows macOS
netsparker.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0

An educational guide explaining buffer overflow and buffer overrun vulnerabilities, their exploitation methods, and attacks, as part of Veracode's application security resource hub covering AppSec concepts and best practices.

Veracode OWASP
veracode.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 4 hours ago · details
0
vulnerability
en.wikipedia.org · tosh · 7 hours ago · details · hn
0
CVE-2023-41974 CVE-2023-43000 CVE-2023-43010 CVE-2024-23222 CVE-2026-20700
bleepingcomputer.com · Sergiu Gatlan · 8 hours ago · details