Explore >> Select a destination


You are here

www.sonarsource.com
| | www.welivesecurity.com
3.9 parsecs away

Travel
| | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful.
| | statuscode.ch
2.0 parsecs away

Travel
| | Recently I took a look atAtom, a text editor by GitHub. With a little bit of work, I was able to chain multiple vulnerabilities in Atom into an actual Remote Code Execution. The vulnerabilities have been fixed in the1.21.1 release on October 12th, 2017after I reported it via theirHackerOne program. In case you want to...
| | srcincite.io
4.5 parsecs away

Travel
| | Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting...
| | sergioprado.blog
42.7 parsecs away

Travel
| Have you ever wondered how the Linux kernel is tested?