Research Notes
Latest articles and reports on real-world vulnerabilities, memory corruption, and exploitation.
In-depth analysis of N-day flaws, error-path failures, and architectural weaknesses in modern systems.
Research focused on root causes, exploitation primitives, and mitigation bypasses.
Technical work intended for security researchers and low-level exploit developers.
Security analysis
CVE-2025-5914: From Integer Overflow to Ownership Confusion in libarchive RAR Parsing
In this write-up, we present a deep-dive analysis of CVE-2025-5914, a critical vulnerability in libarchive originating from an integer overflow during RAR archive parsing...
0x52656164
By: Byte Reaper
17 jan, 2026
Security analysis
Memory Tagging Extension (MTE) - Comprehensive Technical Overview
This article provides a comprehensive technical overview of MTE. The discussion is structured to first establish the fundamental operational concepts, including the pointer and memory tagging mechanisms. Subsequently, the focus shifts to...
0x52656164
By: Byte Reaper
1 nov, 2025
CVE Analysis
CVE-2025-39913: Linux Kernel eBPF SOCKMAP Use-After-Free Vulnerability
This article provides a comprehensive analysis of the CVE-2025-39913 vulnerability in the Linux kernel's eBPF SOCKMAP component, based on detailed research of the kernel architecture and memory management mechanisms...
0x52656164
By: Byte Reaper
18 Oct, 2025
CVE Analysis
CVE-2025–36041 Deep Dive: IBM MQ Architecture, Exploitation, and Mitigation
Comprehensive analysis of the CVE-2025-36041 vulnerability in IBM MQ service, covering architecture details, exploitation techniques, and effective mitigation strategies. This research provides in-depth technical insights into enterprise messaging system security...
0x52656164
By: Byte Reaper
2 oct, 2025