Weaponization of a JavaScriptCore Vulnerability

Software bugs come in many shapes and sizes. Sometimes, these code defects (or ‘asymmetries’) can be used to compromise the runtime integrity of software. Th...

blog.ret2.io