Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
On the Trail to Mobile Pwn2Own
October 27, 2017
Pwn2Own
,
Apple
,
Research
,
Exploit
Blog post
Wrapping the Converter within Foxit Reader
October 17, 2017
Foxit
,
Research
,
Techniques
Blog post
Check it Out: Enforcement of Bounds Checks in Native JIT Code
October 05, 2017
Research
,
JavaScript
,
Chakra
Blog post
VMware Escapology – How to Houdini the Hypervisor
October 04, 2017
VMware
,
Research
,
Metasploit
Blog post
Duck-Assisted Code Execution in EMC Data Protection Advisor
September 26, 2017
0-day
,
Research
,
EMC
Blog post
Simple to Find, Simple to Fix – Locating Weak File Permissions in Advantech WebAccess
September 13, 2017
Research
,
SCADA
,
Advantech
Blog post
Busting Myths in Foxit Reader
August 17, 2017
0-day
,
Research
,
Foxit
Blog post
The Blue Frost Security Challenge: An Exploitation Journey for Fun and Free Drinks
August 10, 2017
Exploit
,
Research
Blog post
Pythonizing the VMware Backdoor
August 03, 2017
VMWare
,
Research
,
Tools
Blog post
Understanding Risk in the Unintended Giant: JavaScript
July 19, 2017
JavaScript
,
Research
keyboard_arrow_left
keyboard_arrow_right