Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
Pwn2Own Ireland - The Full Schedule
October 21, 2024
Pwn2Own
,
Sonos
,
QNAP
,
Synology
,
Lexmark
,
Canon
,
HP
Blog post
Pwn2Own Toronto 2023 - The Full Schedule
October 23, 2023
Pwn2Own
,
Synology
,
Western Digital
,
QNAP
,
Sonos
,
Xiaomi
,
Samsung
Blog post
Exploiting the Sonos One Speaker Three Different Ways: A Pwn2Own Toronto Highlight
May 25, 2023
Sonos
,
Pwn2Own
,
Research
,
Exploit
Blog post
Pwn2Own Toronto 2022 - Day Three Results
December 08, 2022
Samsung
,
Sonos
,
Pwn2Own
Blog post
The Top 5 Bugs Submitted in 2021
January 06, 2022
Top 5
,
Microsoft
,
Linux
,
Exchange
,
Safari
Blog post
The Top 5 Bug Submissions of 2020
December 16, 2020
Top 5
,
Microsoft
,
FreeBSD
,
VMware
,
Apple
Blog post
Privilege Escalation Via the Core Shell COM Registrar Object
December 20, 2019
Top 5
,
Windows
,
Research
Blog post
Regular Exploitation of a Tesla Model 3 through Chromium RegExp
December 19, 2019
Top 5
,
Tesla
,
Pwn2Own
Blog post
Looking Back at the Impact of CVE-2019-0604: A SharePoint RCE
December 18, 2019
Top 5
,
SharePoint
,
Research
Blog post
Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes
December 17, 2019
Top 5
,
Windows
,
Research
keyboard_arrow_left
keyboard_arrow_right