PHP unserialization vulnerabilities: What are we missing?
Object Oriented Exploitation: New techniques in Windows mitigation bypass