|
You are here |
securitylab.github.com | ||
| | | | |
docfate111.github.io
|
|
| | | | | [AI summary] The author reverse engineers the Android source code to discover a race condition vulnerability in the MediaTek audio driver that allows kernel crashes, memory leaks, and code execution. | |
| | | | |
raelize.com
|
|
| | | | | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. | |
| | | | |
pwning.systems
|
|
| | | | | The following are some of the bugs I discovered: 2022 CVE-2022-26743: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.4. An attacker that has already achieved code execution in macOS Recovery may be able to escalate to kernel privileges. - Self note: This was both a write and a read of a user controlled size at a user controlled offset. | |
| | | | |
semgrep.dev
|
|
| | | From code to production, with context | ||