Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Extracting Embedded MultiMediaCard (eMMC) contents in-system
June 20, 2025 | Dmitry Janushkevich
CONTINUE READING
SUBSCRIBE
Blog post
Detailing Two VMware Workstation TOCTOU Vulnerabilities
October 22, 2020
VMware
,
Exploit
,
Research
Blog post
Performing SQL Backflips to Achieve Code Execution on Schneider Electric’s EcoStruxure Operator Terminal Expert at Pwn2Own Miami 2020
September 10, 2020
Pwn2Own
,
ICS
,
Schneider Electric
Blog post
CVE-2020-9715: Exploiting a Use-After-Free in Adobe Reader
September 03, 2020
Adobe
,
Reader
,
Exploit
Blog post
CVE-2020-10611: Achieving Code Execution on the Triangle MicroWorks SCADA Data Gateway
August 25, 2020
ICS
,
Triangle MicroWorks
,
Pwn2Own
,
SCADA
Blog post
Announcing Pwn2Own Tokyo 2020 – Live from Toronto!
July 28, 2020
Pwn2Own
,
Apple
,
Google
,
Android
,
Facebook
Blog post
Chaining 5 Bugs for Code Execution on the Rockwell FactoryTalk View SE HMI at Pwn2Own Miami
July 23, 2020
Rockwell
,
HMI
,
SCADA
,
Pwn2Own
Blog post
ZDI-20-709: Heap Overflow in the NETGEAR Nighthawk R6700 Router
June 25, 2020
NETGEAR
,
Wireless
,
0-day
,
Exploit
Blog post
A Trio of Bugs Used to Exploit Inductive Automation at Pwn2Own Miami
June 11, 2020
Pwn2Own
,
SCADA
,
Inductive Automation
Blog post
CVE-2020-8871: Privilege Escalation in Parallels Desktop via VGA Device
May 21, 2020
Parallels
,
Exploit
,
Research
Blog post
Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild
May 11, 2020
Oracle
,
WebLogic
,
Exploit
keyboard_arrow_left
keyboard_arrow_right