tl;dr
- Passing corrupted ciphertext to get the symmetric key leak
- Fastbin link corruption
- Exploiting double free and UAF in the heap
tl;dr
tl;dr
tl;dr
tl;dr
tl;dr Linux client-server application heap exploitation
tl;dr
Writeup from InCTFi 2019 bartender
tl;dr Windows 32-bit SEH exploitation
tl;dr
tl;dr 2 element overflow in Array when jit compiled
tl;dr
Array.pop
. Uint32Array
and a Uint8Array
to get a overflow in an ArrayBuffer
and proceed to convert this to arbitrary read-write and execute shellcode.