Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Node.js Trust Falls: Dangerous Module Resolution on Windows
April 08, 2026 | Bobby Gould and Michael DePlante
CONTINUE READING
SUBSCRIBE
Blog post
Testing for Truthiness: Exploiting Improper Checks
March 09, 2018
Microsoft
,
Pwn2Own
,
Research
Blog post
VMware Exploitation through Uninitialized Buffers
March 01, 2018
VMware
,
Exploit
,
Research
,
Pwn2Own
Blog post
The February 2018 Security Update Review
February 13, 2018
Security Patch
,
Apple
,
Adobe
,
Microsoft
Blog post
Pushing WebKit's Buttons with a Mobile Pwn2Own Exploit
February 12, 2018
Apple
,
Research
,
Exploit
,
MP2O
,
Pwn2Own
Blog post
Pwn2Own Returns for 2018: Partners with Microsoft and Sponsored by VMware
January 25, 2018
Pwn2Own
,
Microsoft
,
Apple
,
VMware
Blog post
The January 2018 Security Update Review
January 09, 2018
Apple
,
Adobe
,
Microsoft
,
Security Patch
Blog post
The December 2017 Security Update Review
December 12, 2017
Adobe
,
Apple
,
Microsoft
,
Security Patch
Blog post
The November 2017 Security Update Review
November 14, 2017
Adobe
,
Microsoft
,
Security Patch
Blog post
The Results – Mobile Pwn2Own 2017 Day Two
November 02, 2017
Pwn2Own
,
MP2O
,
Apple
,
Huawei
,
Samsung
Blog post
Mobile Pwn2Own 2017 – Day Two Schedule and Results
November 01, 2017
Pwn2Own
,
MP2O
,
Apple
,
Huawei
,
Google
,
Samsung
keyboard_arrow_left
keyboard_arrow_right