http://darknetsrvqlssdnli6mgoqxud4krgu3hqm62d7whu3gl6xj22fkyaid.onion/read/browser-vulnerabilities-how-they-work-and-how-youre-exploited
A vulnerability is a bug that allows code on a site to break out of the browser sandbox — to execute commands, read memory, leak your IP, drop malware, or take over the system. Main types: RCE (Remote Code Execution): attacker runs code on your machine. Info Leak: extracts memory, files, IP, or system info.