Explore >> Select a destination


You are here

securitylab.github.com
| | googleprojectzero.blogspot.com
3.7 parsecs away

Travel
| | Posted by Mateusz Jurczyk of Google Project Zero This post series is about how we used at-scale fuzzing to discover and report a tot...
| | machevalia.blog
3.8 parsecs away

Travel
| | [AI summary] A blog post discusses a remote code execution vulnerability in Ivanti's Endpoint Manager Cloud Appliance, detailing its exploitation and the author's bounty hunting activities.
| | github.blog
0.7 parsecs away

Travel
| | In this post Ill exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights the strong primitives that an attacker may gain by exploiting errors in the memory management code of GPU drivers.
| | a13xp0p0v.tech
17.0 parsecs away

Travel
| This article discloses the exploitation of CVE-2017-2636, which is a race condition in the n_hdlc Linux kernel driver. My PoC exploit for x86_64 gains root privileges bypassing Supervisor Mode Execution Protection (SMEP).