Vulnerabilities
Buffer Overflow
Also known as: Buffer overrun
Definition
A memory-safety flaw where a program writes past the end of an allocated buffer, corrupting adjacent memory and often enabling code execution.
Examples
- CVE-2014-0160 (Heartbleed) — a memory read overflow in OpenSSL.
- Morris Worm (1988) exploited a stack buffer overflow in fingerd.
Related terms
Stack Overflow Vulnerability
A buffer overflow that occurs on the program stack, typically overwriting the saved return address or local function pointers to redirect execution.
Heap Overflow
A buffer overflow that occurs in dynamically allocated memory, often corrupting allocator metadata, function pointers, or object virtual tables.
Memory Corruption
An umbrella term for vulnerabilities where a program writes outside the bounds of intended memory, undermining type-safety, control flow, or data integrity.
Use-After-Free
A memory-safety bug where a program continues to use memory after it has been freed, often allowing attackers to control object state and hijack execution.
Secure Coding
Secure Coding — definition coming soon.
Fuzz Testing
An automated testing technique that feeds a program large amounts of malformed, random or unexpected input to uncover crashes, memory corruption and security vulnerabilities.