Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
Menu
PRIVACY
WHO WE ARE
HOW IT WORKS
BLOG
ADVISORIES
LOG IN
SIGN UP
The April 2025 Security Update Review
April 08, 2025 | Dustin Childs
CONTINUE READING
SUBSCRIBE
Blog post
CVE-2022-3236: Sophos Firewall User Portal and Web Admin Code Injection
October 19, 2022
Sophos
,
JSON
,
Exploit
Blog post
Riding the InfoRail to Exploit Ivanti Avalanche
July 19, 2022
Ivanti
,
JNDI
,
Exploit
Blog post
Pwn2Own Vancouver 2022 - The Results
May 18, 2022
Microsoft
,
Adobe
,
Chrome
,
Tesla
,
Pwn2Own
Blog post
Pwn2Own Vancouver 2022 - The Schedule
May 17, 2022
Microsoft
,
Adobe
,
Chrome
,
Tesla
,
Pwn2Own
Blog post
Abusing Arbitrary File Deletes to Escalate Privilege and Other Great Tricks
March 17, 2022
Windows
,
LPE
,
Research
,
Exploit
Blog post
CVE-2022-21661: Exposing Database Info via WordPress SQL Injection
January 18, 2022
WordPress
,
Research
,
Exploit
Blog post
Pwn2Own Vancouver Returns for the 15th Anniversary of the Contest
January 12, 2022
Pwn2Own
,
Tesla
,
Microsoft
,
Linux
,
Apple
,
VMware
Blog post
CVE-2021-28632 & CVE-2021-39840: Bypassing Locks in Adobe Reader
October 21, 2021
Adobe
,
Research
,
Exploit
Blog post
CVE-2021-26084: Details on the Recently Exploited Atlassian Confluence OGNL Injection Bug
September 22, 2021
Atlassian
,
Research
,
Exploit
Blog post
ProxyToken: An Authentication Bypass in Microsoft Exchange Server
August 30, 2021
Microsoft
,
Exchange
,
Exploit
keyboard_arrow_left
keyboard_arrow_right