Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The August 2025 Security Update Review
August 12, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2020-7454: Killing Two Birds with One Bug in libalias
June 30, 2020
Oracle
,
FreeBSD
,
Research
Blog post
CVE-2020-1181: SharePoint Remote Code Execution Through Web Parts
June 17, 2020
Microsoft
,
SharePoint
,
Research
Blog post
A Trio of Bugs Used to Exploit Inductive Automation at Pwn2Own Miami
June 11, 2020
Pwn2Own
,
SCADA
,
Inductive Automation
Blog post
CVE-2020-8871: Privilege Escalation in Parallels Desktop via VGA Device
May 21, 2020
Parallels
,
Exploit
,
Research
Blog post
How a Deceptive Assert Caused a Critical Windows Kernel Vulnerability
May 07, 2020
Windows
,
Microsoft
,
Research
Blog post
Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters
May 05, 2020
Intel
,
Wireless
,
Research
Blog post
CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification
April 16, 2020
Linux
,
Pwn2Own
,
Exploit
,
LPE
Blog post
Exploiting the TP-Link Archer A7 at Pwn2Own Tokyo
April 07, 2020
TPLink
,
Pwn2Own
,
Exploit
Blog post
CVE-2020-3947: Use-After-Free Vulnerability in the VMware Workstation DHCP Component
April 02, 2020
VMware
,
Research
,
Escape
Blog post
CVE-2020-0729: Remote Code Execution Through .LNK Files
March 26, 2020
Microsoft
,
Research
,
Security Patch
keyboard_arrow_left
keyboard_arrow_right