Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The April 2025 Security Update Review
April 08, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
The Story of Two Winning Pwn2Own JIT Vulnerabilities in Mozilla Firefox
April 18, 2019
Mozilla
,
Pwn2Own
,
Research
Blog post
A Series of Unfortunate Images: Drupal 1-click to RCE Exploit Chain Detailed
April 11, 2019
Drupal
,
TIP
,
Research
Blog post
Loading up a pair of Qt bugs: Detailing CVE-2019-1636 and CVE-2019-6739
April 03, 2019
Qt
,
Cisco
,
Malwarebytes
,
Research
Blog post
The Apple Bug That Fell Near The WebKit Tree
March 14, 2019
Apple
,
Webkit
,
Research
,
Pwn2Own
Blog post
CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
March 13, 2019
Microsoft
,
SharePoint
,
Research
Blog post
(Web)Access (Un)Control
March 07, 2019
Advantech
,
SCADA
,
Research
Blog post
Finding Unicorns: When the C++ Compiler Writes the Vuln
February 28, 2019
Microsoft
,
Visual Studio
,
Research
Blog post
Using the Weblinks API to Reach JavaScript UAFs in Adobe Reader
February 06, 2019
Adobe
,
Acrobat
,
Research
Blog post
Implementing Fuzz Logics with Dharma
January 31, 2019
Dharma
,
Research
,
Foxit
,
Fuzzer
Blog post
ZDI-18-1372 – The Elegant Bypass
December 21, 2018
Top 5
,
Adobe
,
Research
keyboard_arrow_left
keyboard_arrow_right