Buffer-Overflow
Buffer Overflow — When Memory Boundaries Are Exceeded
A buffer overflow is a memory corruption vulnerability that occurs when data exceeds the allocated memory boundary, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code. This SECMONS glossary entry explains how buffer overflows occur, their impact, and how defenders should interpret related CVEs.
Memory Corruption — How Low-Level Memory Bugs Lead to Crashes, Exploits, and Code Execution
Memory corruption refers to vulnerabilities that allow unintended modification of a program’s memory. This SECMONS glossary entry explains how memory corruption occurs, common weakness types such as use-after-free and buffer overflows, how attackers exploit them, and why memory corruption often leads to remote code execution.
Out-of-Bounds Read (CWE-125) — Reading Memory Beyond Intended Limits
An out-of-bounds read occurs when a program reads data outside the boundaries of an allocated memory buffer. This SECMONS glossary entry explains how out-of-bounds reads happen, their security impact, and how they relate to memory corruption and data exposure vulnerabilities.