Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The April 2025 Security Update Review
April 08, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
Thanksgiving Treat: Easy-as-Pie Windows 7 Secure Desktop Escalation of Privilege
November 19, 2019
Microsoft
,
Windows
,
Research
,
UAC
Blog post
The Little Bitmap That Could(n’t)
October 31, 2019
Microsoft
,
Fuzzer
,
Research
Blog post
CVE-2019-1306: Are you my Index?
October 24, 2019
Microsoft
,
Azure
,
Research
Blog post
CVE-2019-12643: Cisco IOS XE Authentication Bypass Vulnerability
October 18, 2019
Cisco
,
Research
Blog post
CVE-2019-8697: MacOS System Escalation Via Disk Management
October 03, 2019
Apple
,
macOS
,
Research
Blog post
CVE-2019-0801: Microsoft Office Uri Hyperlink Hijinks
September 24, 2019
Microsoft
,
Office
,
Research
Blog post
CVE-2019-1257: Code Execution on Microsoft SharePoint Through BDC Deserialization
September 19, 2019
Microsoft
,
SharePoint
,
Research
Blog post
Patch Analysis: Examining a Missing Dot-Dot in Oracle WebLogic
September 17, 2019
Oracle
,
Research
,
Security Patch
Blog post
MindShaRE: Hardware Reversing with the TP-Link TL-WR841N Router
September 03, 2019
MindshaRE
,
Belkin
,
Research
,
Reverse Engineering
Blog post
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
August 22, 2019
Squid
,
Research
keyboard_arrow_left
keyboard_arrow_right