Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025 | Dmitry Janushkevich
CONTINUE READING
SUBSCRIBE
Blog post
MindShaRE: When MySQL Cluster Encounters Taint Analysis
February 10, 2022
MindshaRE
,
MySQL
,
Taint Analysis
Blog post
The February 2022 Security Update Review
February 08, 2022
Adobe
,
Microsoft
,
Security Patch
Blog post
CVE-2021-44142: Details on a Samba Code Execution Bug Demonstrated at Pwn2Own Austin
February 01, 2022
Samba
,
Pwn2Own
,
Netatalk
,
Research
Blog post
CVE-2021-44790: Code Execution on Apache via an Integer Underflow
January 25, 2022
Apache
,
Research
Blog post
Looking Back at the Zero Day Initiative in 2021
January 20, 2022
Retrospective
,
Pwn2Own
,
Program News
Blog post
CVE-2022-21661: Exposing Database Info via WordPress SQL Injection
January 18, 2022
WordPress
,
Research
,
Exploit
Blog post
Pwn2Own Vancouver Returns for the 15th Anniversary of the Contest
January 12, 2022
Pwn2Own
,
Tesla
,
Microsoft
,
Linux
,
Apple
,
VMware
Blog post
The January 2022 Security Update Review
January 11, 2022
Adobe
,
Microsoft
,
Security Patch
Blog post
The Top 5 Bugs Submitted in 2021
January 06, 2022
Top 5
,
Microsoft
,
Linux
,
Exchange
,
Safari
Blog post
CVE-2021-45105: Denial of Service via Uncontrolled Recursion in Log4j StrSubstitutor
December 18, 2021
Log4j
,
Apache
,
Research
keyboard_arrow_left
keyboard_arrow_right