Checkout my videos on the webp vulnerability: https://www.youtube.com/watch?v=lAyhKaclsPM https://www.youtube.com/watch?v=PJLWlmp8CDM The huffman table algorithm as implemented in C is very confusing and I could not understand how the attackers were able to control the overflow properly. But after watching