Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2019-1257: Code Execution on Microsoft SharePoint Through BDC Deserialization
September 19, 2019
Microsoft
,
SharePoint
,
Research
Blog post
Patch Analysis: Examining a Missing Dot-Dot in Oracle WebLogic
September 17, 2019
Oracle
,
Research
,
Security Patch
Blog post
The September 2019 Security Update Review
September 10, 2019
Security Patch
,
Microsoft
,
Adobe
Blog post
MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router
September 03, 2019
MindshaRE
,
Belkin
,
Research
,
Reverse Engineering
Blog post
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
August 22, 2019
Squid
,
Research
Blog post
Taking Control of VMware Through the Universal Host Control Interface: Part 2
August 15, 2019
VMware
,
Pwn2Own
,
Research
Blog post
The August 2019 Security Update Review
August 13, 2019
Security Patch
,
Adobe
,
Microsoft
Blog post
Wipe Out! Hanging (More Than) Ten On Your Old Belkin SURF Router
August 01, 2019
Research
,
Hardware
,
Belkin
Blog post
CVE-2019-7839: ColdFusion Code Execution Through JNBridge
July 25, 2019
Adobe
,
Research
,
ColdFusion
Blog post
MindShaRE: Automated Bug Hunting by Modeling Vulnerable Code
July 16, 2019
MindshaRE
,
Research
,
Reverse Engineering
keyboard_arrow_left
keyboard_arrow_right