Vulnerability disclosures, CVE discoveries, technical write-ups, and security tooling published by Jiva. Research credibility is central to the Jiva Security brand.
printf() — %n used to overwrite interrupt code from 0x7e to 0x7f in conditional_unlock_door().unlock_door() payload written to stack and executed via return address overwrite.strcpy() null terminator weaponized to satisfy a null-byte requirement while overwriting the return address.0xec) preserved in payload while overwriting return address to redirect execution to unlock_door().printf() — %n used to write a non-zero value to the stack address controlling the unlock_door() conditional.call #0x4446 <unlock_door> inside login().0xc7 into the adjacent memory byte that login() compares as its unlock sentinel value.check_password() bypassed by reading little-endian values directly from the disassembly.create_password() — extracted directly via memory inspection before comparison loop executes.Current areas of active research and vulnerability investigation.
Embedded systems, IoT devices, firmware security, and hardware interface enumeration.
Deep protocol analysis across network, wireless, and proprietary communication stacks.
Modern web application vulnerabilities, logic flaws, and API security research.
Vulnerability exploitation techniques, exploit development, and proof-of-concept creation.
All vulnerabilities discovered during independent research are disclosed responsibly, coordinating with affected vendors prior to public release. If you are a vendor and have received a disclosure report from Jiva Security, please use the contact details provided in the report for coordination.