Skip to main content

Advertisement

Fig. 1 | Cybersecurity

Fig. 1

From: From proof-of-concept to exploitable

Fig. 1

An example heap overflow. The vulnerability at line 10 could overwrite the following object, i.e., obj2. PoC inputs would crash at line 12 and enter a non-exploitable state. Successful exploits will trigger the exploitable state at line 14

Back to article page