https://mulp.dev/exploiting-bof
For this topic I went with https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/
buffer overflowexploitingblog
https://liveoverflow.com/speedrun-hacking-buffer-overflow-speedrun-001-dc27-2/
Simple buffer overflow speedrun challenge, exploited with a ROP chain generated by Ropper. And analyse the timeline.
buffer overflowspeedrunhacking
https://www.dlink.com/de/de/support/support-news/2023/june/20/dap-2622-change-id-password-auth-password-vulnerability
dapddpchangeidpassword
https://www.sophos.com/ja-jp/security-advisories/sophos-sa-20200625-xg-user-portal-rce
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.
buffer overflowresolvedxgfirewalluser
https://www.dell.com/support/kbdoc/en-us/000223209/dsa-2024-105-security-update-for-dell-poweredge-server-bios-for-a-heap-based-buffer-overflow-vulnerability
Dell PowerEdge Server BIOS remediation is available for a Heap-based Buffer Overflow Vulnerability that could be exploited by malicious users to compromise the...
security updatedell poweredgedsaserverbios
https://www.ntp.org/support/securitynotice/ntpbug2669/
A remote attacker can send a carefully crafted packet that can overflow a stack buffer and potentially allow malicious code to be executed with the privilege...
buffer overflowntpbugconfigure
https://www.techtarget.com/searchsecurity/definition/buffer-overflow
Understand buffer overflows, types of attacks and prevention strategies, and learn how to mitigate vulnerabilities with secure programming practices.
what isbuffer overflowhow dotypes
https://mail-archive.com/qemu-devel@nongnu.org/msg1093754.html
stablehwusbfix