Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Pwn2Own Returns to Ireland with a One Million Dollar WhatsApp Target
July 31, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild
May 11, 2020
Oracle
,
WebLogic
,
Exploit
Blog post
How a Deceptive Assert Caused a Critical Windows Kernel Vulnerability
May 07, 2020
Windows
,
Microsoft
,
Research
Blog post
Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters
May 05, 2020
Intel
,
Wireless
,
Research
Blog post
CVE-2020-3947: Use-After-Free Vulnerability in the VMware Workstation DHCP Component
April 02, 2020
VMware
,
Research
,
Escape
Blog post
CVE-2020-0729: Remote Code Execution Through .LNK Files
March 26, 2020
Microsoft
,
Research
,
Security Patch
Blog post
Pwn2Own Day Two – Results and Master of Pwn
March 20, 2020
Pwn2Own
,
Windows
,
Oracle
,
Adobe
,
VMware
Blog post
CVE-2020-2555: RCE Through a Deserialization Bug in Oracle’s WebLogic Server
March 05, 2020
Oracle
,
WebLogic
,
Exploit
Blog post
Reliably Finding and Exploiting ICS/SCADA Bugs
January 16, 2020
SCADA
,
Advantech
,
Research
Blog post
Privilege Escalation Via the Core Shell COM Registrar Object
December 20, 2019
Top 5
,
Windows
,
Research
Blog post
Looking Back at the Impact of CVE-2019-0604: A SharePoint RCE
December 18, 2019
Top 5
,
SharePoint
,
Research
keyboard_arrow_left
keyboard_arrow_right