1 post
Exploit a surveillance system tracking application by bypassing file restrictions and causing heap corruption.