bug-bounty448
google354
xss341
microsoft283
facebook246
apple171
exploit163
rce160
malware102
account-takeover95
cve91
bragging-post84
csrf83
browser77
writeup76
privilege-escalation68
react60
authentication-bypass57
cloudflare54
dos53
node52
ssrf51
docker51
phishing50
aws48
access-control47
oauth45
smart-contract45
supply-chain44
ethereum43
defi42
web342
sql-injection41
lfi37
idor35
smart-contract-vulnerability32
vulnerability-disclosure32
web-application31
burp-suite31
reverse-engineering31
clickjacking31
race-condition31
info-disclosure31
wordpress30
cloud29
input-validation29
information-disclosure29
web-security27
solidity27
cors26
0
6/10
tutorial
Educational article explaining how buffer overflow vulnerabilities occur in low-level languages like C, how attackers exploit them via stack frame manipulation and return address overwriting, and what defense mechanisms (DEP, ASLR, stack canaries) are used to mitigate them.
buffer-overflow
stack-overflow
memory-corruption
c-programming
arbitrary-code-execution
shellcode
memory-safety
vulnerability-class
defense-mechanisms
address-space-layout-randomization
stack-canaries
Piotr Sobolewski
Invicti
Linux
Microsoft Windows
macOS
StackGuard
Java
Python
PHP
JavaScript
Perl