Back to directory
WRITEUP #1591

Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game

RCEV8 JavaScript engineMemory corruption
byJan Vojtěšek
Program
Valve
Published
Feb 8, 2023
Added to HackDex
Feb 13, 2023
Read Full Writeuphttps://decoded.avast.io/janvojtesek/dota-2-under-attack-how-a-v8-bug-was-exploited-in-the-game/
RELATED WRITEUPS
4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways
RCEBuffer Overflow
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write

Built with ❤️ by Shubham Rawat