|
You are here |
securitylab.github.com | ||
| | | | |
googleprojectzero.blogspot.com
|
|
| | | | | Posted by Mateusz Jurczyk of Google Project Zero This post series is about how we used at-scale fuzzing to discover and report a tot... | |
| | | | |
machevalia.blog
|
|
| | | | | [AI summary] A blog post discusses a remote code execution vulnerability in Ivanti's Endpoint Manager Cloud Appliance, detailing its exploitation and the author's bounty hunting activities. | |
| | | | |
github.blog
|
|
| | | | | In this post Ill exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights the strong primitives that an attacker may gain by exploiting errors in the memory management code of GPU drivers. | |
| | | | |
a13xp0p0v.tech
|
|
| | | This article discloses the exploitation of CVE-2017-2636, which is a race condition in the n_hdlc Linux kernel driver. My PoC exploit for x86_64 gains root privileges bypassing Supervisor Mode Execution Protection (SMEP). | ||