Two Birds With One Stone: An Introduction To V8 And JIT Exploitation Posted onDecember 7, 2021December 9, 2021AuthorCyber Security Review In this special blog series, ZDI Vulnerability Researcher Hossein Lotfi looks at the exploitation ofSubscribe or log in to read more.