blog.includesecurity.com/2025/03/memory-corruption-in-delphi

Preview meta tags from the blog.includesecurity.com website.

Linked Hostnames

11

Thumbnail

Search Engine Appearance

Google

https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi

Memory Corruption in Delphi - Include Security Research Blog

In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.



Bing

Memory Corruption in Delphi - Include Security Research Blog

https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi

In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.



DuckDuckGo

https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi

Memory Corruption in Delphi - Include Security Research Blog

In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.

  • General Meta Tags

    9
    • title
      Memory Corruption in Delphi - Include Security Research Blog
    • charset
      UTF-8
    • robots
      index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
    • article:published_time
      2025-03-13T18:55:16+00:00
    • article:modified_time
      2025-03-13T20:16:01+00:00
  • Open Graph Meta Tags

    10
    • US country flagog:locale
      en_US
    • og:type
      article
    • og:title
      Memory Corruption in Delphi - Include Security Research Blog
    • og:description
      In our team's latest blog post, we build a few examples that showcase ways in which memory corruption vulnerabilities could manifest in Delphi code despite being included in a list of "memory safe" languages within a paper published by the NSA. We cover how compiler flags and dangerous system library routines could affect memory safety while demonstrating Delphi stack/heap-based overflow examples and conclude with a few tips for developers to avoid introducing memory vulnerabilities in their Delphi code.
    • og:url
      https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/
  • Twitter Meta Tags

    7
    • twitter:card
      summary_large_image
    • twitter:creator
      @includesecurity
    • twitter:site
      @includesecurity
    • twitter:label1
      Written by
    • twitter:data1
      krisinclude
  • Link Tags

    39
    • EditURI
      https://blog.includesecurity.com/xmlrpc.php?rsd
    • alternate
      https://blog.includesecurity.com/feed/
    • alternate
      https://blog.includesecurity.com/comments/feed/
    • alternate
      https://blog.includesecurity.com/2025/03/memory-corruption-in-delphi/feed/
    • alternate
      https://blog.includesecurity.com/wp-json/wp/v2/posts/2825

Links

40