writeups.xyz writeups.xyz / Memory Corruption

Title Vulnerabilities Programs Authors
Hunting for Android Privilege Escalation with a 32 Line Fuzzer
Hacking ISP CPE equipment: FiberHome
Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol
OLE object are still dangerous today — Exploiting Microsoft Office
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
Technical Advisory: Vulnerabilities Identified within ListServ
How I Made A Heap Overflow In Curl
Rooting Xiaomi WiFi Routers
Uncursing the ncurses: Memory corruption vulnerabilities found in library
CVE-2023-4039: GCC's -fstack-protector fails to guard dynamic stack allocations on ARM64
Chained to hit: Discovering new vectors to gain remote and root access in SAP Enterprise Software
Finding and Exploiting Citrix NetScaler Buffer Overflow (CVE-2023-3519) (Part 3)
Shifting boundaries: Exploiting an Integer Overflow in Apple Safari
SSD Advisory – TP-Link TL-WR840N Stack Buffe Overflow DOSy
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803
Exploiting the HP Printer without the printer (Pwn2Own 2022)
One mistake, Three bugs: Comprehensive android pentesting.
Multiple Vulnerabilities in Fortra Globalscape EFT Administration Server [FIXED]
chonked pt.1: minidlna 1.3.2 http chunk parsing heap overflow (cve-2023-33476) root cause analysis
XORtigate: Pre-authentication Remote Code Execution on Fortigate VPN (CVE-2023-27997)
Anatomy of an IoT Exploit, from Hands-On to RCE
Exploring Three Remote Code Execution Vulnerabilities in RPC Runtime
Exploiting The Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
‘FriendlyName’ Buffer Overflow Vulnerability in Wemo Smart Plug V2