Identifying Exploitable Memory Objects for Out-of-Bound Write Vulnerabilities