writeups.xyz writeups.xyz / Memory Corruption

Title Vulnerabilities Programs Authors
Ghost In The Ppl Part 1: Byovdll
4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways
CVE-2024-37079:
Vulnerabilities in NodeJS C/C++ add-on extensions
SSD Advisory – Foscam R4M UDTMediaServer Buffer Overflow
CVE-2024-29510 – Exploiting Ghostscript using format strings
Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws
17 vulnerabilities in Sharp Multi-Function Printers
Preauth RCE on NVIDIA Triton Server
Iconv, Set The Charset To RCE: Exploiting The Glibc To Hack The PHP Engine (Part 2)
Multiple vulnerabilities in Eclipse ThreadX
Iconv, Set The Charset To RCE: Exploiting The Glibc To Hack The PHP Engine (Part 1)
Linguistic Lumberjack: Attacking Cloud Services via Logging Endpoints (Fluent Bit - CVE-2024-4323)
CVE-2024-21115: An Oracle Virtualbox LPE Used To Win Pwn2Own
Exploit Archeology - Exploiting an old unknown Server Side Browser
20 Security Issues Found in Xiaomi Devices
CVE-2024-2887: A Pwn2Own Winning Bug In Google Chrome
Exploiting American Conquest
TP-Link TDDP Buffer Overflow Vulnerability
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
Exploiting embedded mitel phones for unauthenticated remote code execution
SSD Advisory – TP-LINK NCXXX Authentication Bypass
Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
*nix libX11: Uncovering and exploiting a 35-year-old vulnerability – Part 2 of 2
Exploring Counter-strike: Global Offensive Attack Surface