Articles & Research Notes

Research Notes

Latest articles and reports on real-world vulnerabilities, memory corruption, and exploitation.

In-depth analysis of N-day flaws, error-path failures, and architectural weaknesses in modern systems.

Research focused on root causes, exploitation primitives, and mitigation bypasses. Technical work intended for security researchers and low-level exploit developers.

CVE-2025-5914: From Integer Overflow to Ownership Confusion in libarchive RAR Parsing

In this write-up, we present a deep-dive analysis of CVE-2025-5914, a critical vulnerability in libarchive originating from an integer overflow during RAR archive parsing...

0x52656164

Memory Tagging Extension (MTE) - Comprehensive Technical Overview

This article provides a comprehensive technical overview of MTE. The discussion is structured to first establish the fundamental operational concepts, including the pointer and memory tagging mechanisms. Subsequently, the focus shifts to...

0x52656164

CVE-2025-39913: Linux Kernel eBPF SOCKMAP Use-After-Free Vulnerability

This article provides a comprehensive analysis of the CVE-2025-39913 vulnerability in the Linux kernel's eBPF SOCKMAP component, based on detailed research of the kernel architecture and memory management mechanisms...

0x52656164

CVE-2025–36041 Deep Dive: IBM MQ Architecture, Exploitation, and Mitigation

Comprehensive analysis of the CVE-2025-36041 vulnerability in IBM MQ service, covering architecture details, exploitation techniques, and effective mitigation strategies. This research provides in-depth technical insights into enterprise messaging system security...

0x52656164