Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Trend Micro
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2024-20697: Windows Libarchive Remote Code Execution Vulnerability
April 17, 2024 | Trend Micro Research Team
CONTINUE READING
SUBSCRIBE
Blog post
Pivot! PIVOT! – Reaching Unreachable Vulnerable Code in Industrial IoT Platforms
September 13, 2018
Research
,
Advantech
,
SCADA
,
Industrial IoT
Blog post
VirtualBox 3D Acceleration: An accelerated attack surface
August 29, 2018
Research
,
Oracle
,
VirtualBox
Blog post
Floating-Poison Math in Chakra
August 22, 2018
Chakra
,
JavaScript
,
Research
Blog post
Throwing Shade: Analysis of a Foxit Integer Overflow
August 01, 2018
Research
,
Foxit
,
PDF
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 2 – The Exploit
June 21, 2018
Research
,
Exploit
,
Bitdefender
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 1 – The Vulnerability
June 19, 2018
Bitdefender
,
Research
,
Exploit
Blog post
Down the Rabbit Hole - A Deep Dive into an attack on an RPC interface
June 07, 2018
Advantech
,
SCADA
,
Research
,
Exploit
Blog post
Malicious Intent using Adobe Acrobat's OCG setIntent
May 29, 2018
Research
,
Adobe
,
Acrobat
Blog post
It’s Time to Terminate the Terminator
May 15, 2018
VBScript
,
Research
,
Microsoft
Blog post
Running with Scissors: The Dangers of Cutting and Pasting Sample Code
May 02, 2018
Research
,
JSON
keyboard_arrow_left
keyboard_arrow_right