blog.includesecurity.com/2025/03/memory-corruption-in-delphi
Preview meta tags from the blog.includesecurity.com website.
Linked Hostnames
11- 16 links toblog.includesecurity.com
- 10 links todocwiki.embarcadero.com
- 4 links toincludesecurity.com
- 2 links toen.wikipedia.org
- 2 links towww.embarcadero.com
- 1 link toblogs.embarcadero.com
- 1 link togithub.com
- 1 link tomedia.defense.gov
Thumbnail

Search Engine Appearance
Memory Corruption in Delphi - Include Security Research Blog
In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.
Bing
Memory Corruption in Delphi - Include Security Research Blog
In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.
DuckDuckGo
Memory Corruption in Delphi - Include Security Research Blog
In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.
General Meta Tags
9- titleMemory Corruption in Delphi - Include Security Research Blog
- charsetUTF-8
- robotsindex, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
- article:published_time2025-03-13T18:55:16+00:00
- article:modified_time2025-03-13T20:16:01+00:00
Open Graph Meta Tags
10og:locale
en_US- og:typearticle
- og:titleMemory Corruption in Delphi - Include Security Research Blog
- og:descriptionIn our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.
- og:urlhttps://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/
Twitter Meta Tags
7- twitter:cardsummary_large_image
- twitter:creator@includesecurity
- twitter:site@includesecurity
- twitter:label1Written by
- twitter:data1krisinclude
Link Tags
39- EditURIhttps://blog.includesecurity.com/xmlrpc.php?rsd
- alternatehttps://blog.includesecurity.com/feed/
- alternatehttps://blog.includesecurity.com/comments/feed/
- alternatehttps://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/feed/
- alternatehttps://blog.includesecurity.com/wp-json/wp/v2/posts/2825
Links
40- https://blog.includesecurity.com
- https://blog.includesecurity.com/2025/02/replacing-a-space-heater-firmware-over-wifi
- https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/?share=facebook
- https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/?share=twitter
- https://blog.includesecurity.com/2025/04/cross-site-websocket-hijacking-exploitation-in-2025