Recent findings have exposed critical memory corruption vulnerabilities in the Delphi programming language, challenging its reputation for providing inherent memory safety. These vulnerabilities can lead to serious security risks, such as application crashes, data exposure, and even remote code execution. The core issue stems from Delphi's memory management, particularly in how it handles arrays, strings, and object allocations. While Delphi has long been considered a "memory-safe" language, particularly in enterprise environments, researchers have demonstrated that poor coding practices can introduce security flaws similar to those seen in C and C++. Although a 2023 NSA report classified Delphi as a "memory-safe" language with some exceptions for unsafe functions, new research disputes this classification. Security analysts from Include Security revealed that certain coding techniques can still result in exploitable memory corruption, even when safety mechanisms are enabled. The researchers provided proof-of-concept demonstrations, showcasing both stack and heap corruption risks. They found that while debug builds with range checking enabled could detect some issues, release builds with default compiler settings remained vulnerable. For instance, disabling range checking allowed stack-based buffer overflows, while functions like Move and FillChar could bypass array bounds checks, leading to heap-based vulnerabilities. This research highlights the need for developers to enforce strict coding practices and optimize compiler settings to enhance memory safety in Delphi applications.
A critical vulnerability in F5 BIG-IP Access Policy Manager (APM) is being actively exploited, with over 14,000 exposed instances identified by Shadowserver. Initially classified a...
Cisco has issued a high-priority security alert concerning a critical flaw in its Smart Software Manager On-Prem (SSM On-Prem) platform, identified as CVE-2026-20160. The vulnerabi...
Modern fraud operations are evolving beyond traditional cyberattacks by leveraging legitimate services and physical-world infrastructure to execute highly effective schemes. Instea...