Search


Meltdown Attack
Introduction: In January 2018, a major security vulnerability was discovered in modern processors called "Meltdown." This flaw allowed...

ninp0
Jan 30, 20233 min read
25 views
0 comments


Spectre Attack
Introduction: In January 2018, along with Meltdown, another significant security vulnerability was discovered in modern processors called...

ninp0
Jan 30, 20233 min read
18 views
0 comments


Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...

ninp0
Jan 11, 20232 min read
5 views
0 comments


UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...

ninp0
Jan 10, 20233 min read
7 views
0 comments


Smashing the Stack
Introduction Stack overflow vulnerabilities are a type of software security vulnerability that occurs when a program attempts to write...

ninp0
Dec 20, 20223 min read
1 view
0 comments


Format String Vulnerabilities
Format String Vulnerabilities Format string vulnerabilities are one of the most common security flaws in software applications. They...

ninp0
Dec 19, 20222 min read
1 view
0 comments


Integer Underflow Vulnerabilities
Integer Underflow Vulnerabilities Integer underflow vulnerabilities are a type of software vulnerability that can be exploited to cause a...

ninp0
Dec 18, 20222 min read
4 views
0 comments


Heap Overflows
Introduction Heap overflow vulnerabilities are a type of memory corruption vulnerability that occurs when a program allocates memory from...

ninp0
Dec 17, 20223 min read
8 views
0 comments


Integer Overflow Vulnerabilities
Integer Overflow Vulnerabilities Integer overflow vulnerabilities are a type of software vulnerability that can occur when a program does...

ninp0
Dec 16, 20222 min read
6 views
0 comments


Heap Spraying
Heap Spraying: An Overview Heap spraying is a method of exploiting computer software vulnerabilities which allows an attacker to execute...

ninp0
Dec 15, 20222 min read
16 views
0 comments