Building Exploit Chains with Logic Bugs