GStreamer is a library for constructing graphs of media-handling components. An OOB-read vulnerability has been identified in the gst_avi_subtitle_parse_gab2_chunk function within gstavisubtitle.c. The function reads the name_length value directly from the input file without checking it properly. Then, the a condition, does not properly handle cases where name_length is greater than 0xFFFFFFFF - 17, causing an integer overflow. In such scenario, the function attempts to access memory beyond the buffer leading to an OOB-read. This vulnerability is fixed in 1.24.10.
#TUTORIAL

Security - Free source code and tutorials for Software developers and Architects."

This is not a tutorial for absolute beginners on how to get started with programming assembly, or a “assembly for dummies” guide. Rather, it is a set of notes and observations I have made while on my own journey into the Microsoft x64 calling conventions that I hope will be useful to others who attempt the same path. Especially since there seems to a dearth of useful information out there regarding some of the stumbling blocks I've come across.

Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc.

Penetration Testing and Red Teaming blogs, webcasts, and podcasts created by the pen testers and security analysts of Black Hills Information Security.

This comprehensive set of reverse engineering tutorials covers x86, x64 as well as 32-bit ARM and 64-bit architectures. If you're a newbie looking to learn reversing, or just someone looking to revise on some concepts, you're at the right place. As a beginner, these tutorials will carry you from nothing upto the mid-basics of reverse engineering, a skill that everyone within the realm of cyber-security should possess. If you're here just to refresh some concepts, you can conveniently use the side bar to take a look at the sections that has been covered so far.

The site for people they like to build Network Servers with CentOS, Ubuntu, Fedora, Debian, Windows Server.

Awesome write-ups from the world’s best hackers intopics ranging from bug bounties, CTFs, Hack the box walkthroughs, hardware challenges, and real-life encounters.

Free Training Tutorials & Videos for IT Courses.

MakeUseOf was founded in 2006 and acquired and owned by Valnet Inc. since 2020., MUO is one of the largest online technology publications that millions of readers every turn to every month for expert tech guidance. We also have hundreds of thousands of fans across social media on Instagram, Facebook, X (Twitter), and Pinterest.

Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.

A tutorial website, we share Microsoft Windows Server, Linux Server, Firewalls, Cloud, Virtualization, and Networking related tutorials.

My name is Brandon Marshall (aka Marsh) I am currently working as an Offensive Security Researcher. A majority of my time is spent developing internal Red Team tooling, reverse engineering, and exploit creation.

exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.

This repository is for the Offensive Security and Reverse Engineering Course. I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings).