Tagged articles
7 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild

Google released an emergency update on April 1 2026 fixing a critical Use‑After‑Free vulnerability (CVE‑2026‑5281) in Chrome’s WebGPU Dawn component, which is already exploited in the wild; the article details the flaw’s mechanics, attack flow, affected versions, exploitation challenges, and mitigation recommendations.

CVE-2026-5281ChromeDawn
0 likes · 16 min read
Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild
OPPO Amber Lab
OPPO Amber Lab
Nov 29, 2024 · Information Security

5 Real Android Native Memory Bugs: Heap Overflows, UAF, and Fixes

This article reviews five high‑severity Android native vulnerabilities, detailing how missing length checks, unsigned integer wrap‑around, thread‑lifecycle misuse, unlocked vectors, and out‑of‑scope pointers lead to heap overflows or use‑after‑free bugs, and presents the remediation steps recommended by Google.

AndroidMemory VulnerabilitiesSecurity
0 likes · 12 min read
5 Real Android Native Memory Bugs: Heap Overflows, UAF, and Fixes
ByteDance Terminal Technology
ByteDance Terminal Technology
Apr 10, 2023 · Information Security

GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows

This article explains how GWP‑ASan, a low‑overhead sampling memory‑sanitizer developed by Google, can be integrated on Windows to detect heap errors such as use‑after‑free, buffer‑underflow, buffer‑overflow and double‑free, describes its monitoring principles, hook implementation, crash‑report augmentation, and presents real‑world case studies and remediation strategies.

Gwp-ASanHeap DebuggingMemory Errors
0 likes · 21 min read
GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows
Liangxu Linux
Liangxu Linux
Mar 13, 2021 · Information Security

How Hackers Break Into the OS Kernel: Methods, Exploits, and Defenses

This article explains how attackers gain kernel-level privileges by exploiting vulnerabilities such as null-pointer dereferences, use-after-free, and integer overflow bugs, outlines the four legitimate ways programs enter kernel mode, and reviews real-world CVE cases and modern mitigation techniques.

CVEOS securityUse-After-Free
0 likes · 10 min read
How Hackers Break Into the OS Kernel: Methods, Exploits, and Defenses
Liangxu Linux
Liangxu Linux
May 31, 2020 · Fundamentals

Detecting Memory Leaks and Errors with AddressSanitizer (ASan)

This guide explains how to use GCC's built‑in AddressSanitizer to detect memory leaks, heap/stack/global buffer overflows, use‑after‑free, and initialization‑order bugs, providing sample code, compilation flags, and example outputs for each error type.

AddressSanitizerC++ debuggingUse-After-Free
0 likes · 18 min read
Detecting Memory Leaks and Errors with AddressSanitizer (ASan)