Research Article

A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities

Figure 1

Typical exploitation process for off-by-one vulnerability, the number before the chunk represents its size.