|
You are here |
www.sonarsource.com | ||
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | |
| | | | |
statuscode.ch
|
|
| | | | | Recently I took a look atAtom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution. The vulnerabilities have been fixed in the1.21.1 release on October 12th, 2017after I reported it via theirHackerOne program. In case you want to... | |
| | | | |
srcincite.io
|
|
| | | | | Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting... | |
| | | | |
sergioprado.blog
|
|
| | | Have you ever wondered how the Linux kernel is tested? | ||