Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
Throwing Shade: Analysis of a Foxit Integer Overflow
August 01, 2018
Research
,
Foxit
,
PDF
Blog post
MindshaRE: An Introduction to PyKD
July 19, 2018
MindshaRE
,
PyKD
,
Python
Blog post
The July 2018 Security Update Review
July 10, 2018
Microsoft
,
Adobe
,
Security Patch
Blog post
Checking In: A Look Back at the First Half of 2018
July 09, 2018
Retrospective
,
Stats
Blog post
MindshaRE: Variant Hunting with IDA Python
June 27, 2018
IDA
,
Python
,
MindshaRE
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 2 – The Exploit
June 21, 2018
Research
,
Exploit
,
Bitdefender
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 1 – The Vulnerability
June 19, 2018
Bitdefender
,
Research
,
Exploit
Blog post
The June 2018 Security Update Review
June 12, 2018
Security Patch
,
Adobe
,
Microsoft
Blog post
Down the Rabbit Hole - A Deep Dive into an attack on an RPC interface
June 07, 2018
Advantech
,
SCADA
,
Research
,
Exploit
Blog post
Malicious Intent using Adobe Acrobat's OCG setIntent
May 29, 2018
Research
,
Adobe
,
Acrobat
keyboard_arrow_left
keyboard_arrow_right