Latest Advisories
2026-04
CVE-2026-0539: Local Privilege Escalation in pcvisit Remote Software
2026-04
CVE-2026-3991: Local Privilege Escalation in Symantec DLP Agent
2026-02
CVE-2025-13176: Local Privilege Escalation in ESET Inspect EDR
2025-11
CVE-2025-51682, CVE-2025-51683: Time Management Software SQLi-RCE
2025-10
CVE-2025-10363: Unauthenticated RCE in Swiss Finance Software Topal
2025-05
CVE-2025-47188: Mitel Phone Unauthenticated RCE
2019-04
CVE-2019-10123: Logistics Sofware SQLi-RCE
Latest Blog Posts
Attacking EDRs Part 4: Fuzzing Defender's Scanning and Emulation Engine (mpengine.dll)
Multiple out-of-bounds read and null dereference bugs were identified in Microsoft Defender by using Snapshot Fuzzing with WTF and kAFL/NYX. The bugs can be used to crash the main Defender process as soon as the file is scanned. Most are unpatched, but none appear exploitable for code execution.
2025-05-23
|
3901 words
|
20 minutes
Attacking EDRs Part 3: One Bug to Stop them all
This post describes a DoS vulnerability affecting most Windows EDR agents. The vulnerability is an issue in the handling of already existing objects in the Object Manager's namespace.
2025-02-24
|
3422 words
|
17 minutes
Attacking EDRs Part 2: Driver Analysis Results
The second part describes the process and results of the EDR driver security analysis of Palo Alto Cortex using manual analysis and Sophos Intercept X using snapshot fuzzing. Only minor vulnerabilities were identified (CVE-2024-5905).
2025-02-17
|
3599 words
|
18 minutes
Attacking EDRs Part 1: Intro & Security Analysis of EDR Drivers
This article gives an overview of the attack surface of EDR software and describes the process to search for attack surface on EDR drivers from a low-privileged user.
2025-02-10
|
2340 words
|
12 minutes
Tear Down The Castle - Part 2
Stephan Berger
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-23
|
1514 words
|
8 minutes
Tear Down The Castle - Part 1
Stephan Berger
To gain insight into common issues and patterns of misconfiguration, we analyzed 250 PingCastle reports collected from Incident Response cases and Compromise Assessments.
2025-01-19
|
1814 words
|
9 minutes
Breaking CAPTCHAs with image recognition
Mario Bischof
This article explains how image recognition services can be used to bypass (i.e. auto-solve) classical alphanumeric CAPTCHAs.
2023-09-09
|
1339 words
|
7 minutes