Explore >> Select a destination


You are here

blog.quarkslab.com
| | donncha.is
4.8 parsecs away

Travel
| | [AI summary] A security researcher discovered a remote code execution vulnerability in Ubuntu's Apport crash reporting system, allowing attackers to execute arbitrary code by exploiting a Python code injection flaw and path traversal issues in default file handlers.
| | blog.thalium.re
2.6 parsecs away

Travel
| | [AI summary] The blog post discusses the author's experience in vulnerability research and exploitation targeting Steam and its related products, including Steam Link and Remote Play. It covers various vulnerabilities such as format string vulnerabilities, request forgery, heap overflows, and a remote code execution (RCE) exploit. The author also details their interactions with HackerOne and Valve, highlighting the challenges in getting timely responses and the eventual resolution of the reported issues.
| | googleprojectzero.blogspot.com
4.6 parsecs away

Travel
| | Posted by Mateusz Jurczyk of Google Project Zero This post series is about how we used at-scale fuzzing to discover and report a tot...
| | thinkdfir.com
36.1 parsecs away

Travel
| In preparation for an upcoming FOR500 class I thought I would test out one of the recent additions to the class. This post by my colleague Zach shows that Win10 1903 and later has a registry key that will store the full path of any executable that utilises the computers camera or microphone. Zach shows...