Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The December 2025 Security Update Review
December 09, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
Detailing Two VMware Workstation TOCTOU Vulnerabilities
October 22, 2020
VMware
,
Exploit
,
Research
Blog post
CVE-2020-9715: Exploiting a Use-After-Free in Adobe Reader
September 03, 2020
Adobe
,
Reader
,
Exploit
Blog post
CVE-2020-7460: FreeBSD Kernel Privilege Escalation
September 01, 2020
FreeBSD
,
LPE
,
Research
Blog post
CVE-2020-7454: Killing Two Birds with One Bug in libalias
June 30, 2020
Oracle
,
FreeBSD
,
Research
Blog post
ZDI-20-709: Heap Overflow in the NETGEAR Nighthawk R6700 Router
June 25, 2020
NETGEAR
,
Wireless
,
0-day
,
Exploit
Blog post
CVE-2020-8871: Privilege Escalation in Parallels Desktop via VGA Device
May 21, 2020
Parallels
,
Exploit
,
Research
Blog post
Details on the Oracle WebLogic Vulnerability Being Exploited in the Wild
May 11, 2020
Oracle
,
WebLogic
,
Exploit
Blog post
CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters
April 29, 2020
Microsoft
,
SharePoint
,
Exploit
Blog post
CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification
April 16, 2020
Linux
,
Pwn2Own
,
Exploit
,
LPE
Blog post
Exploiting the TP-Link Archer A7 at Pwn2Own Tokyo
April 07, 2020
TPLink
,
Pwn2Own
,
Exploit
keyboard_arrow_left
keyboard_arrow_right