1. 7
  1.  

  2. 3

    I posted this mainly because I came across it just today in research of another class of bugs and found this one not only to be relevant to my research but also found it interesting in terms of demonstrations on an attacker’s mindset during exploit development.