What are some exploitable memory corruption attacks I have not listed?

Dangling pointer(heap)
Use After Free(heap)
Double Free(heap)
Off by one(stack)
Integer Overflow(stack)
Unused Variable(stack and heap)
underrun(stack and heap)
race condition(stack and heap)

From what I’ve seen unused variable and under… Continue reading What are some exploitable memory corruption attacks I have not listed?