Search
ninp0
Jan 30, 20233 min read
Meltdown Attack
Introduction: In January 2018, a major security vulnerability was discovered in modern processors called "Meltdown." This flaw allowed...
24 views0 comments
ninp0
Jan 30, 20233 min read
Spectre Attack
Introduction: In January 2018, along with Meltdown, another significant security vulnerability was discovered in modern processors called...
14 views0 comments
ninp0
Jan 11, 20232 min read
Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...
4 views0 comments
ninp0
Jan 10, 20233 min read
UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...
7 views0 comments
ninp0
Dec 20, 20223 min read
Smashing the Stack
Introduction Stack overflow vulnerabilities are a type of software security vulnerability that occurs when a program attempts to write...
1 view0 comments
ninp0
Dec 19, 20222 min read
Format String Vulnerabilities
Format String Vulnerabilities Format string vulnerabilities are one of the most common security flaws in software applications. They...
1 view0 comments
ninp0
Dec 18, 20222 min read
Integer Underflow Vulnerabilities
Integer Underflow Vulnerabilities Integer underflow vulnerabilities are a type of software vulnerability that can be exploited to cause a...
3 views0 comments
ninp0
Dec 17, 20223 min read
Heap Overflows
Introduction Heap overflow vulnerabilities are a type of memory corruption vulnerability that occurs when a program allocates memory from...
8 views0 comments
ninp0
Dec 16, 20222 min read
Integer Overflow Vulnerabilities
Integer Overflow Vulnerabilities Integer overflow vulnerabilities are a type of software vulnerability that can occur when a program does...
5 views0 comments
ninp0
Dec 15, 20222 min read
Heap Spraying
Heap Spraying: An Overview Heap spraying is a method of exploiting computer software vulnerabilities which allows an attacker to execute...
2 views0 comments