Explore >> Select a destination


You are here

www.acepace.net
| | csandker.io
12.1 parsecs away

Travel
| | Compared to Linux, the Window's authorization process is quite complex and quite a few actors and objects are involved in this process. As a result, there a lot of terms and acronyms that must be known in order to understand and follow up on the topic. To get an idea of what is covered in this guide take a look on this overview of terms and acronyms...
| | pwning.systems
1.7 parsecs away

Travel
| | The following are some of the bugs I discovered: 2022 CVE-2022-26743: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Monterey 12.4. An attacker that has already achieved code execution in macOS Recovery may be able to escalate to kernel privileges. - Self note: This was both a write and a read of a user controlled size at a user controlled offset.
| | labs.bluefrostsecurity.de
4.9 parsecs away

Travel
| | An Analysis of the Windows kernel vulnerability CVE-2014-4113, demonstrating how it can successfully be exploited on Windows 8.1 | Bluefrostsecurity.
| | www.techinterviewhandbook.org
27.4 parsecs away

Travel
| Study guides for coding interviews with focus on data structures and algorithms, including practice questions, techniques, time complexity and recommended resources