Vulnerabilities
Memory Corruption
Also known as: Memory safety bug
Definition
An umbrella term for vulnerabilities where a program writes outside the bounds of intended memory, undermining type-safety, control flow, or data integrity.
Examples
- Browser renderer compromises chained from heap overflow → ROP → sandbox escape.
- Kernel privilege escalation through a use-after-free in a device driver.
Related terms
Buffer Overflow
A memory-safety flaw where a program writes past the end of an allocated buffer, corrupting adjacent memory and often enabling code execution.
Use-After-Free
A memory-safety bug where a program continues to use memory after it has been freed, often allowing attackers to control object state and hijack execution.
Double Free
A memory-safety bug where the same heap chunk is freed twice, corrupting allocator metadata and often enabling arbitrary code execution.
Integer Overflow
A bug where an arithmetic operation produces a value outside the representable range of its integer type, wrapping or truncating in security-critical ways.
Secure Coding
Secure Coding — definition coming soon.
Vulnerability
A weakness in a system, application, or process that an attacker can exploit to violate confidentiality, integrity, or availability.