Buffer Overflow — When Memory Boundaries Are Exceeded
A buffer overflow is a memory corruption vulnerability that occurs when data exceeds the allocated memory boundary, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code. This SECMONS glossary entry explains how buffer overflows occur, their impact, and how defenders should interpret related CVEs.
Memory Corruption — How Low-Level Memory Bugs Lead to Crashes, Exploits, and Code Execution
Memory corruption refers to vulnerabilities that allow unintended modification of a program’s memory. This SECMONS glossary entry explains how memory corruption occurs, common weakness types such as use-after-free and buffer overflows, how attackers exploit them, and why memory corruption often leads to remote code execution.
Out-of-Bounds Read (CWE-125) — Reading Memory Beyond Intended Limits
An out-of-bounds read occurs when a program reads data outside the boundaries of an allocated memory buffer. This SECMONS glossary entry explains how out-of-bounds reads happen, their security impact, and how they relate to memory corruption and data exposure vulnerabilities.
Use-After-Free (CWE-416) — How Memory Lifecycle Bugs Lead to Code Execution
Use-After-Free (CWE-416) is a memory corruption vulnerability class where a program continues to use memory after it has been freed. This SECMONS glossary entry explains how use-after-free bugs occur, why they are dangerous, how they are exploited, and how defenders should interpret related CVEs.