Table of Contents 1. overflow definition and attribute values 2. Attribute effect display 2.1 overflow: visible; do not crop the part beyond the box 2.2 overflow: hidden; hide the content beyond the box; clear the float 2.3 overflow: scroll scroll bar 2.3.1 overflow-y: auto; overflow-x: hidden; 2.3.2 overflow-x: auto; overflow-y: hidden; 2.3.3 overflow: scroll forces […]
Tag: overflow
Attack and utilization techniques of overflow vulnerabilities in exception handling – Part 1
This article focuses on the exception handling corresponding to C++ under Linux, that is, the study of attack methods for the unwind exception handling process based on eh_frame. Since there are certain differences in the exception handling process and underlying implementation in different operating systems and languages, specific issues need to be dealt with on […]
CVE-2023-0179-Nftables integer overflow
Foreword Netfilter is a network packet filtering framework for Linux operating systems that provides a flexible way to manage the flow of network packets. Netfilter allows system administrators and developers to control how data packets are processed in the Linux kernel to implement network security, Network Address Translation (NAT), packet filtering and other functions. Cause […]
CVE-2023-0179-Nftables integer overflow
Foreword Netfilter is a network packet filtering framework for Linux operating systems that provides a flexible way to manage the flow of network packets. Netfilter allows system administrators and developers to control how data packets are processed in the Linux kernel to implement network security, Network Address Translation (NAT), packet filtering and other functions. Cause […]
Solve the problem of memory overflow when exporting large files
Without further ado, let’s get straight to the code. Import dependencies <dependencies> <dependency> <groupId>com.alibaba</groupId> <artifactId>easyexcel-core</artifactId> <version>3.1.0</version> <scope>compile</scope> </dependency> </dependencies> Build EasyExcel, a tool for exporting large files import com.alibaba.excel.EasyExcel; import com.alibaba.excel.support.ExcelTypeEnum; import org.springframework.beans.BeanUtils; import org.springframework.lang.Nullable; import org.springframework.web.context.request.RequestContextHolder; import org.springframework.web.context.request.ServletRequestAttributes; import javax.servlet.http.HttpServletResponse; import javax.validation.constraints.NotNull; import java.io.IOException; import java.lang.reflect.InvocationTargetException; import java.net.URLEncoder; import java.util.ArrayList; import java.util.List; /** * […]
01-windows stack overflow
Simple stack overflow Test environment: win xp sp3 cn Auxiliary environment: mac, pwntoosl, msf installed Use the accompanying book files in 0day security: 0day\02 Stack Overflow Principles and Practice\2_4_overflow_code_exec\Debug\stack_overflow_exec.exe git clone https://github.com/jas502n/0day-security-software-vulnerability-analysis-technology.git Program logic analysis #include <stdio.h> #include <windows.h> #define PASSWORD “1234567” int verify_password (char *password) {<!– –> int authenticated; char buffer[44]; authenticated=strcmp(password,PASSWORD); strcpy(buffer,password);//over flowed […]
stack overflow#stack overflow
Table of Contents recursive review From recursion to stack overflow Problem introduction special perspective Problem regression problem solved subprocess Computer memory (why stack overflow occurs) What is stack overflow summary Recursive review Recursion of functions [frog jumping up stairs]https://mp.csdn.net/mp_blog/creation/editor/133971224 Text I believe that when you write function recursion, you will definitely try the simplest recursion, […]
HackTheBox’s Overflow drone
Foreword This is a difficult target machine. The content of the target machine mainly examines various aspects of web vulnerability exploitation, reverse engineering, permission maintenance, privilege escalation, etc. This target machine is very suitable for entry-level reverse engineering, and it is very helpful in improving penetration thinking. I learned from it. Also benefited a lot. […]
Function call: Why does stack overflow occur?
Table of Contents Why do we need a program stack? Introduce function stack How to construct a stack overflow? How to use function inlining for performance optimization? summary We often encounter errors in the process of developing software. If you have searched for error information on Google, you should have visited the Stack Overflow website […]
Page-level Heap Fengshui — Cross-Cache OverflowcorCTF2022-cache-of-castaways
Foreword What is Cross Cache? In fact, it means literally. We know that most structures in the kernel have their own dedicated slab memory pool. Now we can imagine this scenario. We have an overflow vulnerability of a specific kmem-cache, so how do we exploit it? Program analysis There is no need to read the […]