|
You are here |
wiki.henkaku.xyz | ||
| | | | |
docfate111.github.io
|
|
| | | | | ||
| | | | |
blog.quarkslab.com
|
|
| | | | | This third article from the Samsung's TrustZone series details some vulnerabilities that were found and how they were exploited to obtain code execution in EL3. | |
| | | | |
www.anvilsecure.com
|
|
| | | | | I reversed the firmware of my Garmin Forerunner 245 Music back in 2022 and found a dozen or so vulnerabilities in their support for Connect IQ applications. They can be exploited... | |
| | | | |
reverse.put.as
|
|
| | | This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year's Pwnie for Epic Achievement exploiting TIOCSTI ioctl. Days ago he posted a video demonstrating an exploit for CVE-2017-5123 and luckly for you I managed to convince him to do a write-up about it. I hope you enjoy his work. Thanks Federico! | ||