Credit: Vincenzo Iozzo, Willem Pinckaers, Ralf-Phillipp Weinmann
The three researchers chained two WebKit information leak vulnerabilities and an integer overflow to gain code execution on the BlackBerry. Their accomplishment is even more impressive because of the fact that they had no debugger, no core dumps and no documentation about the BlackBerry internals.