Discover the hidden user registration feature and weak randomization algorithm in Xplico that lead to a critical unauthenticated remote code execution (RCE) vul
This article analyzes the CVE-2017-11826 exploit used in RTF documents to target Microsoft Office. Key techniques such as type confusion and ROP are discussed,
Google has launched a new project to clear vulnerabilities from the Google Play store by rewarding security experts who discover flaws in Android apps with at l
This article analyzes the Windows DNS API RCE vulnerability discovered in Microsoft's 2017 security bulletin, focusing on the Nsec3_RecordRead function within d