Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2018-12794: Using Type Confusion to Get Code Execution in Adobe Reader
September 18, 2018
Adobe
,
Research
,
Exploit
Blog post
Pivot! PIVOT! – Reaching Unreachable Vulnerable Code in Industrial IoT Platforms
September 13, 2018
Research
,
Advantech
,
SCADA
,
Industrial IoT
Blog post
The September 2018 Security Update Review
September 11, 2018
Adobe
,
Microsoft
,
Security Patch
Blog post
VirtualBox 3D Acceleration: An accelerated attack surface
August 29, 2018
Research
,
Oracle
,
VirtualBox
Blog post
Floating-Poison Math in Chakra
August 22, 2018
Chakra
,
JavaScript
,
Research
Blog post
The August 2018 Security Update Review
August 14, 2018
Adobe
,
Microsoft
,
Security Patch
Blog post
Throwing Shade: Analysis of a Foxit Integer Overflow
August 01, 2018
Research
,
Foxit
,
PDF
Blog post
The July 2018 Security Update Review
July 10, 2018
Microsoft
,
Adobe
,
Security Patch
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 2 – The Exploit
June 21, 2018
Research
,
Exploit
,
Bitdefender
Blog post
Analyzing an Integer Overflow in Bitdefender AV: Part 1 – The Vulnerability
June 19, 2018
Bitdefender
,
Research
,
Exploit
keyboard_arrow_left
keyboard_arrow_right