<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://www.proggen.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://www.proggen.org/feed.php">
        <title>proggen.org security:memory-corruption:about</title>
        <description></description>
        <link>https://www.proggen.org/</link>
        <image rdf:resource="https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico" />
       <dc:date>2026-04-08T06:25:13+0200</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://www.proggen.org/doku.php?id=security:memory-corruption:about:author&amp;rev=1663869537"/>
                <rdf:li rdf:resource="https://www.proggen.org/doku.php?id=security:memory-corruption:about:tutorial&amp;rev=1663869537"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico">
        <title>proggen.org</title>
        <link>https://www.proggen.org/</link>
        <url>https://www.proggen.org/lib/tpl/proggenX/images/favicon.ico</url>
    </image>
    <item rdf:about="https://www.proggen.org/doku.php?id=security:memory-corruption:about:author&amp;rev=1663869537">
        <dc:format>text/html</dc:format>
        <dc:date>2022-09-22T19:58:57+0200</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>About The Author</title>
        <link>https://www.proggen.org/doku.php?id=security:memory-corruption:about:author&amp;rev=1663869537</link>
        <description>About The Author

The initial version of this tutorial was written by Daniel Marth as part of the course „183.597 Project in Software Engineering &amp; Internet Computing“ at TU Wien at the ESSE research group. After the course was completed and the tutorial graded, it was handed over to the community of proggen.org for further improvement. If you spot any errors, unclear explanations or simply want to add more content or examples, please contact the community in the</description>
    </item>
    <item rdf:about="https://www.proggen.org/doku.php?id=security:memory-corruption:about:tutorial&amp;rev=1663869537">
        <dc:format>text/html</dc:format>
        <dc:date>2022-09-22T19:58:57+0200</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>About This Tutorial</title>
        <link>https://www.proggen.org/doku.php?id=security:memory-corruption:about:tutorial&amp;rev=1663869537</link>
        <description>About This Tutorial

Memory management is a task known to demand high discipline and carefulness from software developers. Neglecting these requirements causes not only unstable but also vulnerable code. Exploitation of a memory corruption vulnerability can crash the application, manipulate data or in the worst case enable the attacker to execute arbitrary code on the machine running the application. Depending on the context of the vulnerable application, this possibly implies further exploitati…</description>
    </item>
</rdf:RDF>
