bug-bounty622
facebook464
xss316
google151
rce105
microsoft97
apple65
csrf61
account-takeover54
web354
writeup51
exploit42
sqli41
cve37
ssrf35
cloudflare33
dos33
malware29
privilege-escalation29
defi28
smart-contract-vulnerability25
idor24
subdomain-takeover24
ethereum23
smart-contract23
clickjacking23
access-control21
node21
vulnerability-disclosure21
browser20
auth-bypass20
lfi19
aws19
remote-code-execution18
react17
cloud17
reverse-engineering16
cors16
docker16
oauth15
info-disclosure15
race-condition15
solidity14
authentication-bypass14
supply-chain13
phishing13
wordpress12
denial-of-service11
sql-injection11
delegatecall11
0
tutorial
This article explains how buffer overflow vulnerabilities work, demonstrating how attackers craft malicious input to overwrite stack memory, particularly return addresses, to execute arbitrary code. It covers the mechanics of stack buffer overflows, practical examples in C, and discusses modern OS-level and compiler-based prevention techniques like DEP, ASLR, and stack canaries.
buffer-overflow
memory-safety
stack-overflow
arbitrary-code-execution
vulnerability-explanation
c-programming
shellcode
memory-protection
exploit-technique
address-space-layout-randomization
data-execution-prevention
stack-canary
return-address-overwrite
Invicti
Piotr Sobolewski
StackGuard
Linux
Microsoft Windows
macOS