Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
CVE-2025-4919: Corruption via Math Space in Mozilla Firefox
July 15, 2025 | Hossein Lotfi
CONTINUE READING
SUBSCRIBE
Blog post
Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters
May 05, 2020
Intel
,
Wireless
,
Research
Blog post
CVE-2020-3947: Use-After-Free Vulnerability in the VMware Workstation DHCP Component
April 02, 2020
VMware
,
Research
,
Escape
Blog post
CVE-2020-0729: Remote Code Execution Through .LNK Files
March 26, 2020
Microsoft
,
Research
,
Security Patch
Blog post
Reliably Finding and Exploiting ICS/SCADA Bugs
January 16, 2020
SCADA
,
Advantech
,
Research
Blog post
Privilege Escalation Via the Core Shell COM Registrar Object
December 20, 2019
Top 5
,
Windows
,
Research
Blog post
Looking Back at the Impact of CVE-2019-0604: A SharePoint RCE
December 18, 2019
Top 5
,
SharePoint
,
Research
Blog post
Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes
December 17, 2019
Top 5
,
Windows
,
Research
Blog post
CVE-2019-9512 – A Microsoft Windows HTTP/2 Ping Flood Denial of Service
December 05, 2019
Research
,
HTTP
,
DoS
Blog post
Diving Deep Into a Pwn2Own Winning WebKit Bug
November 26, 2019
Apple
,
WebKit
,
Research
Blog post
Thanksgiving Treat: Easy-as-Pie Windows 7 Secure Desktop Escalation of Privilege
November 19, 2019
Microsoft
,
Windows
,
Research
,
UAC
keyboard_arrow_left
keyboard_arrow_right