bug-bounty433
google352
xss348
microsoft280
facebook245
apple171
exploit160
rce156
malware97
account-takeover94
cve88
csrf82
writeup80
bragging-post78
browser77
privilege-escalation67
react59
authentication-bypass57
cloudflare54
dos53
docker51
ssrf51
node50
aws47
access-control47
phishing46
smart-contract45
oauth45
ethereum43
supply-chain43
web342
defi42
sql-injection41
lfi37
idor34
smart-contract-vulnerability32
clickjacking31
race-condition31
web-application31
reverse-engineering31
info-disclosure30
wordpress30
vulnerability-disclosure29
cloud28
information-disclosure28
burp-suite28
solidity27
web-security27
cors26
ctf26
0
6/10
tutorial
Educational article explaining how buffer overflow vulnerabilities occur in low-level languages like C, how attackers exploit them via stack frame manipulation and return address overwriting, and what defense mechanisms (DEP, ASLR, stack canaries) are used to mitigate them.
buffer-overflow
stack-overflow
memory-corruption
c-programming
arbitrary-code-execution
shellcode
memory-safety
vulnerability-class
defense-mechanisms
address-space-layout-randomization
stack-canaries
Piotr Sobolewski
Invicti
Linux
Microsoft Windows
macOS
StackGuard
Java
Python
PHP
JavaScript
Perl