Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Announcing Pwn2Own Berlin for 2026
March 12, 2026 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad
February 19, 2026
Windows
,
Notepad
,
Research
Blog post
CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall
February 05, 2026
Research
,
Arista
,
Firewall
Blog post
Breaking Down the Attack Surface of the Kenwood DNR1007XR – Part Two
January 09, 2026
IVI
,
Kenwood
,
Research
,
Reverse Engineering
Blog post
CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin
September 24, 2025
NVIDIA
,
Research
,
AI
,
ML
Blog post
CVE-2025-20281: Cisco ISE API Unauthenticated Remote Code Execution Vulnerability
July 25, 2025
Cisco
,
Reverse Engineering
,
Research
Blog post
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025
Research
,
Automotive
,
Hardware
Blog post
CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS
May 07, 2025
Apple
,
macOS
,
Research
Blog post
SolarWinds Access Rights Manager: One Vulnerability to LPE Them All
December 12, 2024
SolarWinds
,
Research
,
LPE
Blog post
From Pwn2Own Automotive: More Autel Maxicharger Vulnerabilities
October 03, 2024
Autel
,
Automotive
,
Research
Blog post
Exploiting Exchange PowerShell After ProxyNotShell: Part 4 – No Argument Constructor
September 26, 2024
Microsoft
,
Exchange
,
Research
keyboard_arrow_left
keyboard_arrow_right