Day: December 6, 2022
Pwn2Own Toronto 2022 – The Schedule
Welcome to Pwn2Own Toronto 2022! his year marks the 10th anniversary of our consumer-focused version of the contest, and we plan on celebrating by putting some amazing research on display. For this year’s event, we have 26 contestants and teams attempting to exploit 66 targets across multiple categories. As always, we began our contest with …
AI at the Point of Care: Startup’s Portable Scanner Diagnoses Brain Stroke in Minutes
For every minute that a stroke is left untreated, the average patient loses nearly 2 million neurons. This means that for each hour in which treatment fails to occur, the brain loses as many neurons as it does in more than three and a half years of normal aging. With one of the world’s first …
AI at the Point of Care: Startup’s Portable Scanner Diagnoses Brain Stroke in MinutesRead More
NEWS
-
ZDI-23-1494: Apple Safari TypedArray copyWithin Integer Underflow Remote Code Execution Vulnerability
September 30, 2023This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. -
ZDI-23-1493: G Data Total Security GDBackupSvc Service Link Following Local Privilege Escalation Vulnerability
September 30, 2023This vulnerability allows local attackers to escalate privileges on affected installations of G Data Total Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. -
ZDI-23-1492: Linux Kernel XFRM Out-Of-Bounds Read Information Disclosure Vulnerability
September 30, 2023This vulnerability allows local attackers to disclose sensitive information on affected installations of the Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.