{"uuid": "c51ec0ef-fed0-4aa1-9f7a-5c487ffb0908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-9802", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1681", "content": "#Research\n\"Safari JITSploitation\", 2020.\n// Technical challenges involved in finding and exploiting JavaScript engine vulnerabilities in modern web browsers and evaluates current exploit mitigation technologies\nPart 1. A JIT Bug (CVE-2020-9802 PoC)\nhttps://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html\nPart 2. Getting Read/Write (GigaUnCager PoC)\nhttps://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html\nPart 3. Subverting Control Flow (APRR bypass)\nhttps://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html", "creation_timestamp": "2022-06-08T21:31:23.000000Z"}