Linking pages
- A Methodical Approach to Browser Exploitation | RET2 Systems Blog https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ 7 comments
- JavaScript Engine Fuzzing and Exploitation Reading List [Updated 2022] :: Zon8 Research — Vulnerability research journal. https://zon8.re/posts/javascript-engine-fuzzing-and-exploitation-reading-list/ 4 comments
Linked pages
- String.prototype.replace() - JavaScript | MDN https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/String/replace 7 comments
- http://www.phrack.org/papers/attacking_javascript_engines.html 5 comments
- Lookout | Integrated Endpoint-to-Cloud Security https://info.lookout.com/rs/051-ESQ-475/images/pegasus-exploits-technical-details.pdf 4 comments
- Tracing garbage collection - Wikipedia https://en.wikipedia.org/wiki/Tracing_garbage_collection 0 comments
Related searches:
Search whole site: site:phoenhex.re
Search title: Pwn2Own 2017: UAF in JSC::CachedCall (WebKit) - phoenhex team
See how to search.